Blog

May 23, 2024

Overcoming SOC Challenges in Multi-Cloud and Hybrid Cloud Scenarios

SOC Security Analytics

Multi-cloud and hybrid cloud architectures have become increasingly prevalent among enterprises. This approach involves distributing infrastructure across multiple cloud service providers, such as Azure and AWS, to enhance redundancy and mitigate the risk of downtime. While leveraging the…

Read More

May 23, 2024

Gurucul Continues to Innovate and be Furthest to the Right in the 2024 Gartner Magic Quadrant for SIEM

SOC Security Analytics

As the majority of the SIEM industry becomes stagnant, we believe the report validates that Gurucul continues to go beyond other vendors to continuously deliver innovations. Gurucul meets the evolving requirements of customers by combating threat actors attempting…

Read More

May 16, 2024

SIEM Market Consolidation: What Does This Mean for Customers?

SOC Security Analytics

Unpacking the SIEM Merger Shuffle   There is a lot of upheaval in the SIEM market. Exabeam and LogRhythm announced merger plans on the same day that Palo Alto said they’re buying IBM’s legacy QRadar product. Of course,…

Read More

May 8, 2024

5 Requirements for Modern Insider Threat Detection Tools

Insider Threat

The menace of insider threats is an ever-present concern for organizations. These threats, emanating from within, necessitate a sophisticated defense strategy underscored by advanced insider threat detection tools. Why Modern Insider Threat Detection Tools are Needed Insider threats present a…

Read More

May 7, 2024

Bellingcat Malware Investigation

Threat Research

Introduction Bellingcat, known for its investigative journalism, recently became the target of a sophisticated cyber attack. The analysis revolves around an email campaign that aimed to compromise Bellingcat’s systems. Here are the key details: Attack Vector: The attackers used an…

Read More

April 1, 2024

10 Questions to Ask SIEM Providers

SOC Security Analytics

As organizations increasingly prioritize cybersecurity, finding the right Security Information and Event Management (SIEM) solution becomes crucial. SIEM providers play a vital role in helping businesses protect their sensitive data and detect potential security threats. However,…

Read More

March 23, 2024

Royal Ransomware

Threat Research

Executive Summary 1. Origins and Activity: The Royal ransomware made its debut in 2022, swiftly establishing itself as a significant menace in the cybersecurity landscape. During its reign, Royal has targeted both U.S. and international organizations, infiltrating their networks with malicious…

Read More

March 20, 2024

APT28’s OCEANMAP Backdoor

Threat Research

OCEANMAP: This sophisticated backdoor, attributed to the notorious Russian cyber espionage group APT28 (also known as Sofacy or Fancy Bear), was initially identified by CERT-UA. Let’s break down. Key Features: On December 28, 2023, CERT-UA reported a cyber attack attributed…

Read More

March 12, 2024

Best SIEM Tools and Software, Part 2 – Advanced Features

SOC Security Analytics

SIEM tools and software have come a long way. Learn about the advanced features of Next-Gen SIEM tools and how your company can augment your current SIEM with modern SIEM tool ...

Read More

March 9, 2024

Best SIEM Tools and Software, Part 1 – Knowing the Differences

SOC Security Analytics

Discover what sets the best SIEM tools apart. From understanding key features to evaluating top SIEM tools in the market.

Read More

March 7, 2024

BackMyData Ransomware

Threat Research

Starting on February 11, a widespread ransomware attack struck 100 hospitals across Romania. The attackers exploited vulnerabilities in the hospitals’ systems, forcing them to take critical infrastructure offline. Ransomware Type: BackMyData The malware responsible for this attack belongs to the…

Read More

March 6, 2024

What is Threat Detection, Investigation and Response (TDIR)?

SOC Security Analytics

This detailed blog breaks down what Threat Detection Investigation and Response (TDIR) is, why it is needed, the challenges of implementing TDIR and tips for a successful program.

Read More