Threats

What Is Generative AI (GenAI)?

Gartner’s Top Cybersecurity Trends of 2025 report emphasizes the growing influence of generative AI (GenAI), highlighting new opportunities for organizations to enhance their security strategies and implement more adaptive, scalable defense models. While 2024 was expected to focus on developing minimum viable products, by 2025, we are seeing the first meaningful integration of generative AI […]

The post What Is Generative AI (GenAI)? appeared first on SOC Prime.

Threats

Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools 

The constantly changing cyber threat landscape is seeing the emergence of new malware variants driven by the widespread adoption of AI and its exploitation for offensive purposes. Defenders have recently observed adversaries weaponizing fake AI-powered tools to lure users into downloading a new information-stealing malware known as Noodlophile. The malware is often promoted through fake […]

The post Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools  appeared first on SOC Prime.

Threats

Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools 

The constantly changing cyber threat landscape is seeing the emergence of new malware variants driven by the widespread adoption of AI and its exploitation for offensive purposes. Defenders have recently observed adversaries weaponizing fake AI-powered tools to lure users into downloading a new information-stealing malware known as Noodlophile. The malware is often promoted through fake […]

The post Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools  appeared first on SOC Prime.

Threats

Gunra Ransomware Detection: New Threat Targets Various Industries Globally Using Double-Extortion Tactics and Advanced Malicious Behaviors

According to Sophos, ransomware recovery costs surged to $2.73 million in 2024—marking a staggering 500% increase over the previous year and highlighting the growing financial impact of cyberattacks. As ransomware continues to dominate the threat landscape, adversaries are rapidly evolving their techniques and developing new malware variants. One of the latest additions is Gunra, a […]

The post Gunra Ransomware Detection: New Threat Targets Various Industries Globally Using Double-Extortion Tactics and Advanced Malicious Behaviors appeared first on SOC Prime.

Threats

Gunra Ransomware Detection: New Threat Targets Various Industries Globally Using Double-Extortion Tactics and Advanced Malicious Behaviors

According to Sophos, ransomware recovery costs surged to $2.73 million in 2024—marking a staggering 500% increase over the previous year and highlighting the growing financial impact of cyberattacks. As ransomware continues to dominate the threat landscape, adversaries are rapidly evolving their techniques and developing new malware variants. One of the latest additions is Gunra, a […]

The post Gunra Ransomware Detection: New Threat Targets Various Industries Globally Using Double-Extortion Tactics and Advanced Malicious Behaviors appeared first on SOC Prime.

Threats

Hot OSINT Indicators

How It Works The “Hot OSINT Indicators” tab within Uncoder AI extends the built-in Threat Detection Marketplace search with continuously updated TLP:CLEAR threat intelligence. This data is sourced from publicly disclosed CERT-UA reports and is presented in a structured, query-ready format for immediate operational use. The interface allows users to filter through IOCs categorized by […]

The post Hot OSINT Indicators appeared first on SOC Prime.

Threats

Use Case Documentation from Uncoder AI

How It Works Managing detection use cases across tools can be time-consuming and error-prone. With Uncoder AI, this process is fully streamlined. Users can instantly generate structured documentation for a rule or use case in Confluence—directly from within the Uncoder interface. Once an integration with Confluence is set up (one-time action), the user selects the […]

The post Use Case Documentation from Uncoder AI appeared first on SOC Prime.

Threats

Rule Deployment into a Data Plane

How It Works Uncoder AI supports native integration with Microsoft Sentinel, Google SecOps, and Elastic Stack, enabling users to deploy detection rules directly from the platform. Once a rule is authored or translated within Uncoder AI, the user can instantly push it into their SIEM’s data plane without exporting files or manual upload. In the […]

The post Rule Deployment into a Data Plane appeared first on SOC Prime.

Threats

Rule Customization On The Fly

How It Works Uncoder AI’s on-the-fly customization capability enables security teams to instantly adapt rules and queries to their specific environment using Customization Profiles. The screenshot showcases how analysts can: Choose Custom Field Mappings to tailor table names, index structures, and field naming conventions, ensuring compatibility with internal data schemas. Apply presetsto instantly change parameters […]

The post Rule Customization On The Fly appeared first on SOC Prime.

Threats

Save Detection Code & Metadata to Custom Repositories

How It Works This feature allows detection engineers to store detection rules in their own repositories—alongside all intelligence, MITRE mapping, and operational metadata—in the same format used across Threat Detection Marketplace. Users can choose a platform (e.g., Sigma), specify a repository destination, and provide context like severity and status. The rule and its metadata are […]

The post Save Detection Code & Metadata to Custom Repositories appeared first on SOC Prime.

Exit mobile version