- ADRecon
- APT Attacks
- Authentication
- BESTPRACTICES
- CASESTUDY
- CISO
- cloud native SIEM
- Cloud Security
- CLOUD SECURITY MONITORING
- compliance reporting
- Cyber Attack
- Cyber Security
- DARC Notes
- DETECTION
- DISCUSSION
- INDUSTRY SOLUTION
- LDAP
- MITRE ATT&CK
- MITRE Mapped SIEM Solution
- Modern SIEM Solution
- NGINX
- on-premise SIEM
- Security Analytics
- SIEM
- SIEM Solutions
- SOAR
- SOC
- threat analysis
- threat detection
- THREAT HUNTING
- threat intelligence
- THREATPOST
- UEBA
How to Build a SOC: Your SOC Quick Start Guide
Table of Contents Introduction What is a Security Operations Centre (SOC) How Does SOC ...
PyPi Malware Supply Using Identical Package Name
Table of Contents Introduction
BlackCat aka ALPHAV-ng Ransomware (Since 2021)
The trend of this ransomware has been observed since November 2021, and in the last ...
Two Zero-day Vulnerabilities in Microsoft Exchange Exploited in Wild
We are working on an accelerated timeline to release a fix. Until then, we’re providing ...
Detecting Spring4Shell (CVE-2022-22965) Exploitation Using DNIF HYPERCLOUD
What is Spring4Shell? Spring4Shell is the name given to a critical remote code execution ...
Understanding The Spring4Shell Vulnerability
What is Spring4Shell? Spring4Shell is the name given to a critical remote code execution ...