SOC Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/soc/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Fri, 04 Oct 2024 06:49:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png SOC Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/soc/ 32 32 Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect https://gbhackers.com/redline-malware/ https://gbhackers.com/redline-malware/#respond Tue, 30 Apr 2024 15:12:29 +0000 https://gbhackers.com/?p=88892 The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee has discovered uses Lua bytecode to obfuscate its malicious code.  The malware was discovered on a legitimate Microsoft repository (vcpkg) disguised within a zip file named “Cheat.Lab.2.7.2.zip,”  containing an MSI installer that deployed two executables […]

The post Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/redline-malware/feed/ 0
AMIDES – Open-source Detection System to Uncover SIEM Blind Points https://gbhackers.com/amides-open-source-detection-system/ https://gbhackers.com/amides-open-source-detection-system/#respond Mon, 20 Nov 2023 11:35:56 +0000 https://gbhackers.com/?p=79528 Cyberattacks pose a significant risk, and prevention alone isn’t enough, so timely detection is crucial. That’s why most organizations use SIEM (Security Information and Event Management) systems to centrally collect and analyze security events with expert-written rules for detecting intrusions. Organizations use SIEM rulesets for intrusion detection, focusing on misuse patterns for known attacks. It’s […]

The post AMIDES – Open-source Detection System to Uncover SIEM Blind Points appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post AMIDES – Open-source Detection System to Uncover SIEM Blind Points appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/amides-open-source-detection-system/feed/ 0
IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals https://gbhackers.com/ibm-cloud-native-qradar-siem/ https://gbhackers.com/ibm-cloud-native-qradar-siem/#respond Sat, 11 Nov 2023 11:49:47 +0000 https://gbhackers.com/?p=78056 IBM has recently announced the launch of its Cloud-Native SIEM solution, which is designed to enhance the scale, speed, and flexibility of security teams. With this new offering, organizations can benefit from improved threat detection and response capabilities, empowering them to better protect their digital assets and stay ahead of potential cyber-attacks. IBM Security helps […]

The post IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/ibm-cloud-native-qradar-siem/feed/ 0
SOC Fourth Defense Phase – Cyber Threat Intelligence Guide https://gbhackers.com/cyber-threat-intelligence-benefits/ https://gbhackers.com/cyber-threat-intelligence-benefits/#respond Mon, 10 Jul 2023 10:00:24 +0000 https://gbhackers.com/?p=30960 Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities; the traditional approaches will be increasingly important to maintain but will simply not be sufficient to address risk in individual organizations adequately. Threat actors are constantly inventing new tools and techniques to […]

The post SOC Fourth Defense Phase – Cyber Threat Intelligence Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post SOC Fourth Defense Phase – Cyber Threat Intelligence Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cyber-threat-intelligence-benefits/feed/ 0
Most Enterprise SIEMs Fail Against MITRE ATT&CK Tactics https://gbhackers.com/enterprise-siems-fail/ https://gbhackers.com/enterprise-siems-fail/#respond Wed, 28 Jun 2023 13:58:16 +0000 https://gbhackers.com/?p=67752 SIEM (Security Incident and Event Management) tools are being used in most organizations for monitoring, analyzing, and preventing threat actors. Organizations are trying to build more and more in terms of security to protect against ransomware attacks, data breaches, and many other types of cybercriminal activities. However, Security is a continuous process. These SIEM tools […]

The post Most Enterprise SIEMs Fail Against MITRE ATT&CK Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Most Enterprise SIEMs Fail Against MITRE ATT&CK Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/enterprise-siems-fail/feed/ 0
SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC https://gbhackers.com/soc-defense-attack-chain/ https://gbhackers.com/soc-defense-attack-chain/#respond Mon, 26 Jun 2023 10:51:52 +0000 https://gbhackers.com/?p=27396 This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. Most times, cyber-attacks are getting executed in stages. So the SOC team must understand the attack patterns and the attack chain. So breaking the attack chain and averting the criminal’s intent to stop their […]

The post SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/soc-defense-attack-chain/feed/ 0
Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide https://gbhackers.com/event-logs-cyber-security-operations-center/ https://gbhackers.com/event-logs-cyber-security-operations-center/#respond Tue, 20 Jun 2023 05:54:00 +0000 https://gbhackers.com/?p=12655 Cyber Security operations center is protecting organizations and the sensitive business data of customers. It ensures active monitoring of valuable assets of the business with visibility, alerting and investigating threats, and a holistic approach to managing risk. Analytics service can be an in-house or managed security service. Collecting event logs and analyzing logs with real-world […]

The post Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/event-logs-cyber-security-operations-center/feed/ 0
Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure https://gbhackers.com/modern-cybersoc/ https://gbhackers.com/modern-cybersoc/#respond Sat, 10 Jun 2023 06:30:00 +0000 https://gbhackers.com/?p=25835 In earlier years, everyone depends on CyberSOC (including firewalls, WAF, SIEM, etc.) and the priority in building the SOC provides security, and the CIA was maintained. However, later the emergence of the attacks and the threat actors becomes more challenging and the existing SOC will not be able to provide better security over the CIA. […]

The post Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/modern-cybersoc/feed/ 0
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide https://gbhackers.com/intrusion-prevention-system-architecture/ https://gbhackers.com/intrusion-prevention-system-architecture/#respond Wed, 07 Jun 2023 08:02:18 +0000 https://gbhackers.com/?p=2369 Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into Intrusion Prevention System architecture. An Intrusion Prevention System (IPS) is a framework that screens a network for evil exercises, for example, security dangers or policy compliance. Vulnerability exploits normally come in the form of malicious […]

The post Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/intrusion-prevention-system-architecture/feed/ 0
SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools – 2023 https://gbhackers.com/soc-training-from-scratch/ https://gbhackers.com/soc-training-from-scratch/#respond Fri, 28 Apr 2023 15:16:08 +0000 https://gbhackers.com/?p=25866 SOC Training is one of the most critical concerns in building a Quality Security Operation Center Team to fight against advanced threats that target the organization’s network. Sophisticated detection and prevention technologies are mandatory implementations by security experts since cyber attacks are rising daily. SO implementing a dedicated SOC operation and SOC analyst team who […]

The post SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools – 2023 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools – 2023 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/soc-training-from-scratch/feed/ 0