• Use Case: An example of threat hunting with Converged SIEM

    Originally posted July 2019 - Updated October 2023Threat hunting is gaining relevance by the day [...]

  • CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]

  • Emerging Threat: Akira, Not a CyberPunk Movie – A Very Real Ransomware Threat

    Fast FactsEmerging in March 2023, Akira ransomware has been grabbing daily headlines with its relentless [...]

  • NIS2 Fines: An overview of possible penalties for non-compliance.

    NIS2 builds on the requirements of the original directive; it still aims to protect critical [...]

  • Reduce time to investigate and respond with practical SOC-focused features

    Nowadays not a day goes by without a cyberattack. In 2022, organizations worldwide detected nearly [...]

  • On Demand: Ease of use with SOAR: Streamline Investigation and Response

    Discover the latest updates to SOAR, bringing ease of work to your security operations platform.In [...]

  • SAP Vulnerabilities: Critical Patches and Proactive Measures for System Security

    Ensuring the security and reliability of an organization's IT infrastructure is paramount. SAP systems, which [...]

  • The Rise of Zero Trust Network Security: What You Need to Know

    Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely [...]

  • Emerging Threat: Defending Against 8base – Uncovering Their Arsenal and Crafting Responses

    Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]

  • Big Data and Cybersecurity: A Powerful Union for a Safer Digital Age

    In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily [...]

  • SIEM, Data Lakes, or a Consolidated Security Operations Platform?

    In the seemingly never-ending quest to stay relevant and competitive in the tech industry the [...]

  • How to Build a SOC Team: A Cyber Security Shield Against Digital Threats

    In today's interconnected world, the risk of cyber threats and attacks is ever-present. The escalating [...]