Blog

87e25fc7e4655f5cf1a3033d464a90d6.webp
Blog Davut Selcuk Detection Content Emir Erdogan Kyaw Pyiyt Htet Nattatorn Chuensangarun Osman Demir Sigma Sittikorn Soc Prime Platform Threat Bounty Program

SOC Prime Threat Bounty Digest: June 2024 Results Released

In June, SOC Prime’s Threat Bounty Program members started using Uncoder AI to create, validate, and submit rules for review before the release on the SOC Prime Platform. We are happy to provide authors with th...

dbf0995ef0e1b1454aefc681fa9529b7.webp
Blog Cyberattack Detection Content Latest Threats Malware Ranso Ransomware Soc Prime Platform Threat Bounty Program Threat Hunting Content

Beware of the Latest Volcano Demon Ransomware Attack: Adversaries Unleash LukaLocker Malware with Phone Call Ransom Demands

New ransomware maintainers have rapidly emerged in the cyber threat arena, employing innovative locker malware and a variety of detection evasion tactics. The ransomware gang dubbed “Volcano Demon” leverages no...

1b4b0e3e1dfd2f189a54096f96f16df9.webp
Arc Labs Bdvision Blog Managed Deception Managed Detection &Amp; Response Threat Research

Unleashing Managed Deception in Cybersecurity: Part 1 – Easy Outs

In a previous blog, we discussed how the “businessification” of cybercrime has coalesced around tried and true tools, techniques, and procedures, giving us a solid understanding of how these attacks happen. Sec...

HTML Snippets Powered By : XYZScripts.com