Tag: SoC
-
One policy to rule them all
How cyberattackers exploit group policies, what risks attacks like these pose, and what measures can be taken to protect against such …
-
Exabeam expands New-Scale platform with Open-API support and advanced threat detection
Security intelligence and management solutions company Exabeam Inc. today announced updates to its New-Scale Security Operations Platform …
-
Attackers exploiting a patched FortiClient EMS vulnerability in the wild
Kaspersky’s GERT experts describe an incident with initial access to enterprise infrastructures through a FortiClient EMS vulnerability …
-
Skyhawk Security introduces interactive cloud threat detection for enhanced zero-trust security
Cloud detection and response company Skyhawk Security (CNP) Ltd. today announced it’s adding an interactive cloud threat detection and …
-
5 Ways Behavioral Analytics is Revolutionizing Incident Response
Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a …
-
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses
Kaspersky experts analyze cyberdefense weak points, including patch management, policy violations and MSSP issues, and real-world cases …
-
Whispers from the Dark Web Cave. Cyberthreats in the Middle East
The Kaspersky Digital Footprint Intelligence team shares insights into the H1 2024 Middle Eastern cyberthreat landscape: hacktivism, …
-
Kali Linux 2024.3 released: 11 new tools, Qualcomm Snapdragon SDM845 SoC support
Kali Linux 2024.3 is now available for download. Besides the new tools, this release mainly focuses on behind-the-scenes updates and …
-
A deep dive into the most interesting incident response cases of last year
Kaspersky Global Emergency Response Team (GERT) shares the most interesting IR cases for the year 2023: insider attacks, ToddyCat-like APT, …
-
Approach to mainframe penetration testing on z/OS
We explain how mainframes work, potential attack vectors, and what to focus on when pentesting such …
-
Tusk: unraveling a complex infostealer campaign
Kaspersky researchers discovered Tusk campaign with ongoing activity that uses Danabot and StealC infostealers and clippers to obtain …
-
Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK
How a SOC can efficiently manage priorities when writing detection logic for various MITRE ATT&CK techniques and what tools can …
●●●