May 23, 2024
Overcoming SOC Challenges in Multi-Cloud and Hybrid Cloud Scenarios
SOC Security Analytics
Multi-cloud and hybrid cloud architectures have become increasingly prevalent among enterprises. This approach involves distributing infrastructure across multiple cloud service providers, such as Azure and AWS, to enhance redundancy and mitigate the risk of downtime. While leveraging the…
Read More
May 23, 2024
Gurucul Continues to Innovate and be Furthest to the Right in the 2024 Gartner Magic Quadrant for SIEM
SOC Security Analytics
As the majority of the SIEM industry becomes stagnant, we believe the report validates that Gurucul continues to go beyond other vendors to continuously deliver innovations. Gurucul meets the evolving requirements of customers by combating threat actors attempting…
Read More
May 16, 2024
SIEM Market Consolidation: What Does This Mean for Customers?
SOC Security Analytics
Unpacking the SIEM Merger Shuffle There is a lot of upheaval in the SIEM market. Exabeam and LogRhythm announced merger plans on the same day that Palo Alto said they’re buying IBM’s legacy QRadar product. Of course,…
Read More
May 8, 2024
5 Requirements for Modern Insider Threat Detection Tools
Insider Threat
The menace of insider threats is an ever-present concern for organizations. These threats, emanating from within, necessitate a sophisticated defense strategy underscored by advanced insider threat detection tools. Why Modern Insider Threat Detection Tools are Needed Insider threats present a…
Read More
May 7, 2024
Bellingcat Malware Investigation
Threat Research
Introduction Bellingcat, known for its investigative journalism, recently became the target of a sophisticated cyber attack. The analysis revolves around an email campaign that aimed to compromise Bellingcat’s systems. Here are the key details: Attack Vector: The attackers used an…
Read More
April 1, 2024
10 Questions to Ask SIEM Providers
SOC Security Analytics
As organizations increasingly prioritize cybersecurity, finding the right Security Information and Event Management (SIEM) solution becomes crucial. SIEM providers play a vital role in helping businesses protect their sensitive data and detect potential security threats. However,…
Read More
March 23, 2024
Royal Ransomware
Threat Research
Executive Summary 1. Origins and Activity: The Royal ransomware made its debut in 2022, swiftly establishing itself as a significant menace in the cybersecurity landscape. During its reign, Royal has targeted both U.S. and international organizations, infiltrating their networks with malicious…
Read More
March 20, 2024
APT28’s OCEANMAP Backdoor
Threat Research
OCEANMAP: This sophisticated backdoor, attributed to the notorious Russian cyber espionage group APT28 (also known as Sofacy or Fancy Bear), was initially identified by CERT-UA. Let’s break down. Key Features: On December 28, 2023, CERT-UA reported a cyber attack attributed…
Read More
March 12, 2024
Best SIEM Tools and Software, Part 2 – Advanced Features
SOC Security Analytics
SIEM tools and software have come a long way. Learn about the advanced features of Next-Gen SIEM tools and how your company can augment your current SIEM with modern SIEM tool ...
Read More
March 9, 2024
Best SIEM Tools and Software, Part 1 – Knowing the Differences
SOC Security Analytics
Discover what sets the best SIEM tools apart. From understanding key features to evaluating top SIEM tools in the market.
Read More
March 7, 2024
BackMyData Ransomware
Threat Research
Starting on February 11, a widespread ransomware attack struck 100 hospitals across Romania. The attackers exploited vulnerabilities in the hospitals’ systems, forcing them to take critical infrastructure offline. Ransomware Type: BackMyData The malware responsible for this attack belongs to the…
Read More
March 6, 2024
What is Threat Detection, Investigation and Response (TDIR)?
SOC Security Analytics
This detailed blog breaks down what Threat Detection Investigation and Response (TDIR) is, why it is needed, the challenges of implementing TDIR and tips for a successful program.
Read More