Tag: EN

Implementing blocklists in the Sekoia SOC platform

On a calm Friday afternoon, rumors of a new active threat starts hitting the various social network websites. Your CSIRT team starts checking the private channels they have with other CERTs and starts compiling a list of Indicators of Compromise…

The Curious Case of an Egg-Cellent Resume

Key Takeaways Private Threat Briefs: Over 20 private DFIR reports annually. Threat Feed: Focuses on tracking Command and Control frameworks like Cobalt Strike, Metasploit, Sliver, etc. All Intel: Includes everything from … Read More This article has been indexed from The…

The Shift to the Edge Continues to Accelerate

The IDC MarketScape report evaluated providers in the edge delivery services category. Read why Akamai was chosen as a Leader. This article has been indexed from Blog Read the original article: The Shift to the Edge Continues to Accelerate

Threat Assessment: Howling Scorpius (Akira Ransomware)

Howling Scorpius, active since 2023, uses Akira ransomware to target businesses globally, employing a double-extortion strategy and upgrading tools regularly. The post Threat Assessment: Howling Scorpius (Akira Ransomware) appeared first on Unit 42. This article has been indexed from Unit…

UK Ministry of Defense MoD passwords leaked on Dark Web

The United Kingdom’s Ministry of Defense (MoD) has recently made headlines after it was revealed that over 560 staff members’ passwords were exposed on the dark web, triggering widespread concern within Parliament. The breach is believed to be the work…

How Data Backups Turn Vital in Ransomware Scenarios

Ransomware attacks have become one of the most menacing threats to businesses, governments, and individuals alike. These malicious software programs encrypt vital data and demand a ransom, often in cryptocurrency, to restore access. With the growing sophistication and frequency of…

Apple espionage on its employees iPhones and iCloud accounts

In recent years, we have witnessed a growing trend of surveillance by various entities—ranging from individuals to state actors and organized groups—monitoring both public and private organizations. This trend has also extended to governments using technology like facial recognition to…

What Is a Security Operations Center (SOC)?

A Security Operations Center (SOC) specializes in monitoring and analyzing data to detect cyber threats and prevent attacks from them. They work to sort actual threats from false positives before… The post What Is a Security Operations Center (SOC)? appeared…

Zero Trust Architecture

Zero trust security takes an “never trust, always verify” approach to access control. Access is only granted once an individual’s identity and context have been confirmed through multifactor authentication and… The post Zero Trust Architecture  appeared first on Hacker Combat.…