SOC Analyst Study Notes Part II: Insider Threats

A practical SOC-focused guide to insider threats, covering behavior indicators, detection methods, analyst workflows, real cases, and cross-team response strategies. This article has been indexed from CyberMaterial Read the original article: SOC Analyst Study Notes Part II: Insider Threats

How to Integrate AI into Modern SOC Workflows

Artificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early experimentation into consistent operational value. This is because SOCs are adopting AI without an intentional approach to operational integration. Some…

Evasive Panda Uses DNS Poisoning to Deploy MgBot Backdoor in Long-Running Espionage Campaign

  Security researchers at Kaspersky have uncovered a sophisticated cyber-espionage operation attributed to the China-linked advanced persistent threat (APT) group known as Evasive Panda, also tracked as Daggerfly, Bronze Highland, and StormBamboo. The campaign leveraged DNS poisoning techniques to distribute…