Cyber Hub

Your Place for the Latest CyberProof Updates
Latest Reports
  • 01-Jun-2020

    Latest Developments on Major Ransomware Campaigns

    Tags: [F]Unicorn , HiddenTear , Phishing , PonyFinal , Ransomware
    Label: Threat Advisory
    Threat Level: High

    As ransomware attacks continue to prove themselves as one of the most profitable TTPs for cybercriminals today, their sophistication and frequency increase as well. The average ransom payment in ransomware attacks sharply grew by 33% in Q1 of 2020, and threat actors seems to be highly motivated than ever to utilize it. This week, security researchers have detected new threatening malware strains of the [F]Unicorn ransomware, as well as an extended activity of PonyFinal ransomware against organizations around the world.

  • 01-Jun-2020

    Imminent Malware Threats

    Tags: Attachment , GitHub , Link , Malware , Octopus Scanner , Phishing , SMB , Social Engineering , TrickBot , Valak
    Label: Threat Advisory
    Threat Level: High

    Over the past week, several malware campaigns exposed new developments and capabilities that improve their abilities to avoid detection and cause greater damage to the infected victims. The TrickBot trojan has been seen using a new module to avoid detection and infect domain controllers while a new malware named Valak, that was used as a loader, has started collecting sensitive data. In addition, a new malware dubbed Octopus Scanner was detect infecting organizations using GitHub.

  • 01-Jun-2020

    Latest Reports of Vulnerabilities Exploited in the Wild

    Label: Threat Advisory
    Threat Level: High

    Each week there are several reports of cyber-attacks and high-severity vulnerabilities found. The risk they pose to your organization depends on a variety of factors that are in a near-constant state of change. This week we saw a number of security issues affecting the Exim MTA servers. In addition, we also witnessed attacks exploiting SaltStack vulnerabilities and the dangers of having potentially affected unpatched Cisco products.

  • 25-May-2020

    Latest Developments on Major Botnet Campaigns

    Tags: Botnet , Devil Shadow , Exploit Kit , Malware , RIG EK , Silent Night , Zbot , Zloader
    Label: Threat Advisory
    Threat Level: High

    Botnets remain at the top of the hackers' list of preferred tools due to the ability to magnify attacks without much effort. From DDoS attacks to malware delivery, botnets continue to create headlines with new methods used by threat actors to wreak havoc and seize financial gains.

  • 25-May-2020

    Latest Developments on Major Ransomware Campaigns

    Tags: DLL Injection , netwalker , Ragnar Locker , Ransomware , Virtual Machine
    Label: Threat Advisory
    Threat Level: High

    As ransomware attacks continue proving themselves as one of the most profitable TTPs for cybercriminals today, their sophistication and frequency increases as well. The average ransom payment in ransomware attacks has sharply grown by 33% in Q1 of 2020. Threat actors seem to be highly motivated than ever to utilize it. This week, security teams have discovered new disturbing evasion techniques of the infamous NetWalker and Ragnar Locker ransomware.

  • 25-May-2020

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: Attachment , Coronavirus , COVID-19 , Credentials , Firebase , Link , LogMeIn , NetSupport , OneDrive , Phishing , RAT , Sharepoint , Social Engineering , Tax
    Label: Threat Advisory
    Threat Level: High

    Many new phishing campaigns were detected over the past week where threat actors are still focused on leveraging COVID-19 and the fact that most employees are working remotely, from home, using various communication and collaboration platforms. Apart from that, threat actors continue developing new phishing techniques to avoid detection and not raise suspicion by the victims. A massive campaign capitalizes the Coronavirus to spread the NetSupport RAT, while the collaboration platform, LogMeIn is impersonated to gather credentials. In addition, threat actors are taking advantage of the tax season for credentials gathering as well, while in another campaign, Google Firebase is used to host phishing pages. Moreover, a new phishing campaign is being spread by luring employees to access files that are related to upcoming bonuses in order to gain permissions to internal systems without the need to use credentials or MFA required.

  • 18-May-2020

    New Malware Strains of the Lazarus Group

    Tags: CopperHedge , Lazarus , PebbleDash , RAT , TaintedScribe
    Label: Threat Advisory
    Threat Level: High

    Threat actors consistently come up with new ways to distribute malware that will be used for their malicious intentions to harm individuals and organizations. When it comes to state-sponsored actors, the scope of the attacks usually increases in direct proportion to the threat actor’s resources. Over the past week, security researchers have detected new malware strains that are believed to be associated with the infamous Lazarus hacking group.

  • 11-May-2020

    Latest Developments on Major Ransomware Campaigns

    Tags: ColdLock , Cybercriminals , Ransomware , Snake , Sodinokibi , VCrypt
    Label: Threat Advisory
    Threat Level: High

    The first quarter of 2020 -which is largely defined by lockdown and work-from-home due to COVID-19 - has proved to be the most prolific time for ransomware attacks. Poorly secured RDPs are the most common infection vector for ransomware. As people increasingly leverage this technology to remotely access their corporate networks, the number of successful ransomware attacks increases as well. Accordingly, the average ransom payment grew by 33% in Q1 placing it at $111,605, a huge profit to the attackers, giving much motivation for cyber-gangs to utilize ransomware as their TTP.

  • 11-May-2020

    Imminent Malware Threats

    Tags: Botnet , DacIsRat , IoT , Kaiji , Lazaras
    Label: Threat Advisory
    Threat Level: High

    Threat actors consistently come up with new ways to distribute malware that will be used for their malicious intentions to harm individuals and organizations. Over the past week, a new botnet dubbed Kaiji was detected targeting servers and IoT devices in order to execute DDoS attacks. ln addition, a new macOS version of Dacls RAT associated with the Lazarus Group was observed spreading in the wild.

  • 11-May-2020

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: Attachment , Coro , COVID-19 , Executive , Link , Phishing , Skype , Social Engineering , Webex
    Label: Threat Advisory
    Threat Level: High

    Many new phishing campaigns were detected over the past week: threat actors are still focused on leveraging the fact that most employees are working from home remotely using various communication tools. A massive phishing campaign has been impersonating Cisco Webex to gather credentials using a phishing website. Skype users were also targeted by threat actors who also built a phishing website to gather credentials. Moreover, the FBI has warned of an increase in BEC attacks leveraging the COVID-19 pandemic. Another phishing campaign targeted executive credentials and payment details by impersonating a telecommunications service provider.

Linkedin Linkedin Follow Us
  • Apr 01
    As you adjust to a new remote reality, our cyber threat intelligence team is at work investigating and exposing the latest happenings in the cyber crime communities. This blog identifies the threats and offers critical advice for keeping your cyber health resilient. https://hubs.ly/H0nM_nj0
  • Mar 27
    Cyber criminals and state-sponsored threat actors around the globe, are taking advantage of the COVID-19 outbreak to accelerate their activities and spread their own infections. Here’s how you can stay protected as new threats spread across the cyber landscape >> https://hubs.ly/H0nNfYG0
  • Mar 21
    Analysts predict that cyber crime will cost companies $6 trillion by 2021, which is double the $3 trillion it cost in 2015. So, how can organizations close the gap between cyber threats and cyber security? By implementing managed threat intelligence into their security strategy. Read on for a look at everything you need to know about how to ensure ultimate cyber resilience for your company. https://hubs.ly/H0nwb9h0 hashtagThreatPredictions hashtagCyberCrime hashtagSecurityStrategy
  • Mar 11
    Whether it be due to negligence, malicious intent or infiltration, cyber insider threats are top of mind for many organizations. Sinu Peter, CyberProof’s Principal Security Architect, is here to help you get started on exploring what you need to develop a security program for cyber insider threat identification and remediation. https://hubs.ly/H0nc6lX0 CyberInsiderThreats ProactiveDefence RiskManagement InsiderThreatProgram
  • Mar 09
    New trends have hit the cyber landscape in recent months - including a shift in data regulation, increased applications for AI, ML, deep learning and more. Here’s how we expect it to impact the cyber security industry - both in offensive and defensive security solutions. https://hubs.ly/H0n1MQb0 cyberscape AI hashtagML deeplearning cybersecuritytrends
  • Feb 25
    #Hackers are known to keep their eye on the virtual door of video #conferencing - looking for flaws to sneak into confidential meetings. Threatpost reports on what Zoom is doing to continue #changingthewaypeoplework and create an online room for people to #meethappy and confidently: https://hubs.ly/H0mZrdv0
  • Feb 20
    Starting tomorrow and throughout the next two days, we'll be in Bangalore CISO Platform Summit - one of India’s largest #securityevents where #CISOs will gather to share knowledge and empower themselves to make better security buying decisions. Visit us there at booth CP1230: https://hubs.ly/H0m_jJ20
  • Feb 19
    The #cybersecurity arena is facing a new era of threats, trends, and solutions. We conducted a survey across the company here at CyberProof exploring the question of what we can expect to see and uncovered some interesting predictions. Check them out on our latest blog >> https://hubs.ly/H0n1X940 #cybersecuritytrends #threatpredictions
  • Feb 17
    #ArtificialIntelligence can help #SOCs improve efficiency and reduce response times, but how can #AI and #Automation be put into practice on the ground - and in the cloud? This #securityebook provides a detailed guide for SOCs ready to take their #securityoperations into the future. https://hubs.ly/H0mSMzG0
  • Feb 16
    On Feb 21-22 we’ll be joining CISOs from around the world in Bangalore at the CISO Platform Summit, India’s largest #ITsecurity conference of the year. Visit us at booth CP1230 to learn how we’re using #AI and #automation to build a smarter #SOC >> https://hubs.ly/H0m_yWx0
  • Feb 13
    We’re excited to be Diamond Partners in this year’s CISO Platform Summit, India’s largest #ITsecurity conference - focusing on peer learning, security buying decisions and how we, as #threatintelligence leaders, can make a difference to the world of security. https://hubs.ly/H0m_qRQ0
  • Feb 12
    Here's what The Update Box is bringing to #RSAC2020 ✔️ Real-time vendor and press announcements ✔️ The latest info on upcoming speeches ✔️ A chance to win big at the event
    Enter the #RSAC Giveaway Basket raffle here: https://hubs.ly/H0mHYGf0
  • Feb 10
    Join part 2 of our upcoming #securitywebinar series on Feb 20th, to learn about the fundamentals of building an #intruderhunting program as part of your integrated #cybersecurity and risk management architecture. Sign up today >> https://hubs.ly/H0mNmJc0
  • Feb 05
    Our team had a great time at hashtaghc0n2020 sharing, learning, and networking with cyber tech professionals and ethical hackers at the biggest hacking community event in Spain this past weekend. hashtaghackerconference hashtagethicalhackers hashtaghc0n2020
  • Feb 04
    #Malware has been discovered in this device's very own setup app with little to no hope of removing it - and if that's not bad enough - there are TWO of them. SC Media has the details >> https://hubs.ly/H0mHYDY0 #BuyersBeware
  • Feb 03
    Curious what to expect at #RSAC2020? Stay up to date on the latest at this year's RSA Conference with The Update Box, sponsored by yours truly! https://hubs.ly/H0mJ3pD0
  • Feb 02
    Our team had a great time at Hackplayers #hc0n2020 sharing, learning, and networking with cyber tech professionals and #ethicalhackers at the biggest hacking community event in Spain this past weekend.
  • Jan 29
    We're proud to announce that Orel Pery, our CTI Team Leader will be presenting at one of the biggest #cybersecurity knowledge-exchange events of the year - #hc0n2020. Check out her upcoming participation at Hackplayers #hackingconferencehttps://hubs.ly/H0mMXLC0
  • Jan 27
    As we enter the next decade with #digitalization full steam ahead, where are intelligence expert focusing their efforts to stop #cybercriminals in their tracks? Help Net Security reports on #2020cybertrends and where attackers are expected to be heading: https://hubs.ly/H0mJ0D00
  • Jan 15
    The tables have turned on ring camera doorbells. SC Media shares the details on how hackers are gaining control of them and why the need for IoT security should be taken very seriously as we venture further into digitalisation. https://hubs.ly/H0mpr5M0 digitalisation IoT IoTsecurity hackers
  • Jan 10
    What will 2020 bring to the world of cyber security as IoT continues to evolve? Privacy protection is on the top of the list as the public domain as the demand for manufacturers to produce low-cost, integrated devices grows. https://hubs.ly/H0mpr5Y0   cybersecurity privacyprotection publicdomain
  • Jan 08
    Congrats to Yair Bar Touv, Joo Khuan Quek CISSP, CISM 郭裕宽 and team on the completion of the new branding in our Singapore Center of Excellence. The SOC team supports our regional and global customers for hashtagmdr and hashtagmssp services. hashtagcybersecurity hashtagsoc hashtagcyberproof
  • Dec 25
    Happy Holidays from everyone CyberProof. May your holidays will be filled with joy, laughter, and security through the New Year ahead! #HappyHolidays #SeasonsGreetings #HappyNewYear
  • Dec 23
    As we look ahead at the future of AI and cyber security, we must find a way to use AI to reduce and aid the work of the overloaded intelligence analysts - here's how cyber professionals can make that happen. hubs.ly/H0m22Q60 #AI #cybersecurity #ML #SOC #SOCefficiency #SecurityTeams
Twitter Twitter Follow Us
  • May 26
    "I believe security should continuously adapt to solve the key challenges of the day. And now is a time of challeng… t.co/CsrSNVwEX9
  • Apr 01
    As you adjust to a new #RemoteWork reality our #CTI team investigates the latest happenings in #CyberCrime communities. This blog identifies #CyberThreats and offers critical advice for keeping  our #CyberHealth resilient. blog.cyberproof.com/blog/new-cyber-security-threat-hackers-take-advantage-of-coronavirus
  • Mar 26
    Organizations are vulnerable to malicious campaigns as #Coronavirus forces us many to quickly adapt to a #WFH environment. These guidelines will help minimize potential #CyberSecurityThreats to your organization. blog.cyberproof.com/blog/cyber-security-risk-assessment-threats-to-remote-workers
  • Mar 17
    Thank you @microfocus for the distinction of South Channel Partner of the Year 2020 at this year's Virtual Universe! #MicroFocus #VirtualUniverse twitter.com/MicroFocusNews/status/1239898083200303104
  • Mar 04
    Seriously, the commitment and devotion of our sponsors to tackle the #cybersecurity workforce and walk the walk of… t.co/vatuKVtOVh
  • Mar 04
    RT @cyberproofinc: We’re honored to be recognized by the #CyberSecurityExcellenceAwards2020 as a winner in the #MDR category. >> t.…
  • Mar 02
    RT @cyberproofinc: We’re honored to be recognized by the #CyberSecurityExcellenceAwards2020 as a winner in the #MDR category. >> t.…
  • Feb 25
    En el #CyberSecuritySummit2020, organizado por Esade y @cyberproofinc @USTGlobal_ES, pudimos asistir a interesantes… t.co/cihaK3SRH9
  • Feb 19
    RT @cyberproofinc: Check out our #CyberHub - your place for the latest #cybersecurity news & updates: t.co/iEYTwShTX8
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster I… t.co/NdaT8koQns
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 14
    RT @cyberproofinc: Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to…
  • Feb 14
    RT @cyberproofinc: Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to…
  • Feb 13
    RT @cyberproofinc: We’re excited to be Diamond Partners in this year’s @CISOPlatform Summit, India’s largest #ITsecurity conference - focus…
Facebook Facebook Follow Us
  • Mar 30
    There’s no question that #ThreatIntelligence is a crucial piece of #CyberSecurity. But how do you know where, when, what and with whom to start? The answer is here - with the ultimate guide to #ManagedThreatIntelligence >> https://www.cyberproof.com/managed-threat-intelligence/
  • Mar 25
    In the past week, there has been a spike of #SpearPhishing attacks as well as new VPN threats around Coronavirus. Our #CyberHub is keeping a close on these, as well as providing updates on new capabilities of the infamous trojan #Trickbot #EternalDarkness and #Phishing campaigns as an attack vector on organizations: https://www.cyberproof.com/cyber-hub/
  • Mar 19
    Big thanks to Hen Porcilan for offering insights on streamlining responses against #cyberattacks in yesterday's #SecurityWebinar. In case you missed it or would like to review, you can check it out on-demand here: https://go.cyberproof.com/webinar-streamlining-your-response-to-cyber-attacks
  • Mar 11
    Whether it be due to negligence, malicious intent or infiltration, #CyberInsiderThreats are top of mind for many organizations. Sinu Peter, CyberProof’s Principal Security Architect, is here to help you get started on exploring what you need to develop a #CyberSecurity program for #InsiderThreat identification and remediation: https://hubs.ly/H0nc2h30
  • Mar 10
    Up to date with your security operations? Confident in dealing with #cybersecurity issues? Fear not, CyberProof’s own Senior Security Analyst, Hen Porcilan is hosting a webinar on March 18th, providing tips on how to streamline responses against #cyberattacks leveraging advanced SOC technology. Join us: https://hubs.ly/H0n515h0
  • Mar 05
    In the wake of increasingly sophisticated #CyberThreats, the pressure on enterprise security teams intensifies. Rather than trying to outpace the explosion of #CyberSecurity alerts by constantly hiring more analysts for your #SOCteam#SecurityAutomation services allow SOCs to scale in several key ways. Our CEO, Tony Velleca, explains how on our blog >> https://hubs.ly/H0nh_3p0
  • Feb 25
    #Hackers are known to keep their eye on the virtual door of video #conferencing - looking for flaws to sneak into confidential meetings. Threatpost reports on what Zoom is doing to continue #changingthewaypeoplework and create an online room for people to #meethappy and confidently: https://hubs.ly/H0mZrdv0
  • Feb 21
    We're heading to Bangalore to join CISOs from around the world for two days of peer learning and networking, with a focus on how to make the world a safer place by making better security buying decisions. Meet us at the CISO Platform Summit >> https://hubs.ly/H0m_sSH0
  • Feb 19
    With concerns rising over online #dataprofiling #IoTdevices #facialrecognition software and more… data and digital #privacylaws are at the center of core issues for governments to address. @ITSecGuruNews provides an overview of the #dataprivacy landscape and what's coming for 2020 >> https://hubs.ly/H0mZrdk0
  • Feb 18
    Ready to build an effective Intruder Hunting Program? Join us today for part 2 of our webinar series our VP and Global Head of Customer Success, Bruce A. Roton will explore the following: ☑️ How to identify what you are looking for ☑️ How to select and use the tools at your disposal ☑️ How to build an Intrusion Sensor Array ☑️ The fundamentals of data collection and analysis for use in intruder detection ☑️ Creating an integrated security and risk management architecture
    Sign up for part 2 of this expert security series today to join the conversation >> https://hubs.ly/H0n2zFQ0 Missed part 1? Get it on demand here >> https://hubs.ly/H0n2zl60 #intruderhunting #intruderdetection #securitywebinar #proactivecybersecurity #cybersecurity
  • Feb 17
    We already know not to believe everything we read online, but what about what we see? The lines of reality are being blurred more than ever as #cybercriminals continue to break the truth-barrier with #deepfake videos being created #IRT. https://hubs.ly/H0mZrcp0
  • Feb 14
    Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to date on the next one? Check out our #CyberHub for the latest updates on events, meetups, webinars, and more. https://hubs.ly/H0m_jLs0
  • Feb 13
    If you already have a technical background in #cybersecurity and are looking to delve deeper into the processes of developing an effective #intruderhunting program, this #securitywebinar is for you! Join CyberProof's VP and Global Head of Customer Success, Bruce A. Roton on Feb 20th and gain expert insights into intruder detection, eviction, and remediation >> https://hubs.ly/H0mNCvB0
  • Feb 11
    #Cybersecurity today needs to go beyond playing the defensive to stay ahead of the game. See how CyberProof is bringing #securityservices to the next level with a combination of #automation and #HUMINThttps://hubs.ly/H0mNwwx0
  • Feb 06
    Download our #securityebook to learn about the issues facing today’s #SOC – and how #AI and automation can help organizations stay safe and resilient. https://hubs.ly/H0mSWk50
  • Feb 05
    When it comes to #cyberattacks, the question is not IF but rather WHEN? In part 1 of our intruder hunting #securitywebinar series, we discussed why proactive #intruderhunting is vital to your #cybersecurity strategy. In our upcoming webinar, we'll delve deeper into the processes of building an effective intruder detection program. https://hubs.ly/H0mNHyz0
  • Feb 03
    Huge shout out to our Threat Intelligence Team Leader, Orel Pery, who inspired hundreds of cyber tech leaders at Hackplayers #hc0n2020 with her presentation on getting inside a hackers mindset from the perspective of an analyst - and the connection between the two.
  • Jan 30
    At CyberProof #cybersecurity and #threatintelligence are much more than a day job, it's part of our DNA. Take a couple of minutes (2:17 to be exact) to meet the experts behind CyberProof and see how we transform #securityoperations >> https://hubs.ly/H0mNHFv0
  • Jan 24
    #usecasefactory in your #cybersecuritystrategy is vital for mitigating risks and minimizing damage to an organization. Part 2 of this blog series takes a closer look at the process of identification, validation, development, and operation of a use case: https://hubs.ly/H0mzl9h0 #riskassessment #proactivedefense
  • Jan 23
    We're excited to take part in making this year's #RSAC the best yet, with the launch of The Update Box. A platform that offers RSA attendees the opportunity to optimize their #RSAC2020 experience with real-time info on the best talks, vendor announcements, and press. Check it out here: https://hubs.ly/H0mHYFV0
  • Jan 15
    The tables have turned on ring camera doorbells. @SCMag shares the details on how #hackers are gaining control of them and why the need for #IoT #security should be taken very seriously as we venture further into #digitalisation. hubs.ly/H0mpsNP0
  • Jan 14
    In part 1 of this blog series, we discussed how building a #usecase package requires specific skills – now we're delving deeper into the development process for a #usecasefactory. Let's take a closer look >> hubs.ly/H0mzjYk0 << #cybersecurity #proactivecybersecurity
  • Jan 10
    What will 2020 bring to the world of #cybersecurity as #IoT continues to evolve? #Privacyprotection is on the top of the list as the #publicdomain as the demand for manufacturers to produce low-cost, integrated devices grows. hubs.ly/H0mpqVt0
  • Jan 06
    #ThreatHunting is an art form of sorts. It requires actively looking for signs of malicious activity within enterprise networks, but without prior knowledge of those signs - and for that, the key to success is the expertise of your #securityteam. hubs.ly/H0mg1Gj0
  • Jan 03
    Join part 1 of our upcoming #securitywebinar series on Jan 14th, to learn about the resources and functional components required for effective #IntruderHunting. Then, keep an eye out for Part 2 where we'll delve deeper into the issues and processes of #intruderdetection, from first response through intruder eviction and remediation.
Upcoming Events
  • June 20 - 21, 2020

    Secure Code Warrior Tournament

    CyberProof has teamed up with the gamified secure coding learning platform, Secure Code Warrior, to host a free 48 hour virtual DevSecOps coding challenge.

Webinars
  • The Essentials of a Smarter SOC in the New Normal

    Learn how intelligent SIEMs build smarter SOCs Join >

  • On Demand: InfoSec in India – Before, During, and After COVID-19

    Learn how CISOs can prioritize threat intelligence operations and provide security support and training. Join >

  • On Demand: Security & Privacy Trends in the COVID-19 Era

    In this webinar you'll learn ways to use security to support business, protect brands, and promote trust. Join >

  • On Demand: DevSecOps – How To Do More With Less

    In this webinar you'll gain insights on the value of DevSecOps initiatives. Join >

  • On Demand: Is AI Being Weaponized by Cyber Criminals?

    Are hackers really using AI to enhance their attacks? If so, what does this mean for the companies that have adopted this technology? Join >

  • On Demand: Streamlining Your Response to Cyber Attacks – An Analyst’s Perspective

    Learn how the CyberProof platform helps analysts streamline response time to cyber attacks Join >

  • On Demand: Introduction to Pro-Active Intruder Hunting – Part 2

    Learn how to build an effective and proactive Intruder Hunting Program. Join >

  • On Demand: Introduction to Pro-Active Intruder Hunting – Part 1

    Learn how to build an effective and proactive Intruder Hunting Program. Join >

  • On Demand: New Approaches To DFIR That Can Radically Reduce Your Time To Respond to Attacks

    Learn about new approaches to DFIR that can radically reduce your attack response time. Join >

  • On Demand: How to Reverse Cyber Security’s Staffing Shortage

    Learn how you can reverse cyber security’s staffing shortage via best hiring and security automation. Join >

  • On Demand: How AI Can Increase the Efficiency of Your SOC

    Learn how AI and automation can increase the security posture of the enterprise. Join >

  • On Demand: How Threat Intelligence-Driven Security Operations Leads to Reduces Cyber Incidents

    Learn how to spot and block malicious actors before they become attackers with threat intelligence-driven security operations. Join >

  • On Demand: SANS SOC Survey: Best Practices for Security Operations Centers

    The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations. Join >

  • On Demand: Security Thought Leadership Webinar – July 2019

    Security Thought Leadership: New insights uncover ways to reduce risk Join >

Latest Resources Our Latest Resources
Report SANS 2019 SECURITY OPERATIONS CENTER (SOC) SURVEY

Common and Best Practices for
Security Operations Centers

Read the report

Stay up to date

VISIT OUR BLOG