Tag: soc
-
New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials
Tags: attack, credentials, cyber, detection, intelligence, malware, phishing, soc, spear-phishing, threatAdversaries don’t work 95 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and cyber analysts who hunt, investigate, contain and respond to threats within minutes. Backed by threat intelligence, tactical threat response and advanced threat analytics from our Threat Response Unit (TRU), eSentire delivers rapid detection and disruption…
-
The State of AI in the SOC 2025 – Insights from Recent Study
Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points.A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can First…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Cyberbit Buys RangeForce to Bolster AI-Driven Cyber Training
Deal Strengthens Cyber Ranges By Uniting AI-Driven Content and Live-Fire Exercises. Cyberbit acquired RangeForce, uniting two leading cyber range platforms to accelerate AI-enabled simulation training for SOC and incident response teams. The combined entity aims to deliver a unified user interface, deeper content catalog and improved cyber readiness metrics for security leaders. First seen on…
-
Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
Tags: 2fa, access, advisory, api, attack, authentication, breach, business, cisa, cisco, cloud, control, credentials, crime, cve, cyber, cybersecurity, data, defense, endpoint, exploit, fido, finance, firewall, framework, github, grc, guide, identity, incident response, infrastructure, Internet, ISO-27001, kev, law, lessons-learned, malicious, malware, mfa, mitigation, monitoring, network, open-source, phishing, privacy, ransomware, risk, saas, scam, security-incident, service, soc, software, supply-chain, tactics, threat, update, vpn, vulnerability, vulnerability-management, worm, zero-dayCISA’s takeaways of an agency hack include a call for timely vulnerability patching. Plus, Cisco zero-day bugs are under attack, patch now. Meanwhile, the CSA issued a framework for SaaS security. And get the latest on the npm breach, the ransomware attack that disrupted air travel and more! Here are six things you need to…
-
How agentic AI is changing the SOC
In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC). He explains what agentic AI is, how it … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/26/agentic-ai-in-cybersecurity-video/
-
Thales Named a Leader in the Data Security Posture Management Market
Tags: access, ai, attack, breach, cloud, compliance, container, control, cybersecurity, data, data-breach, defense, detection, encryption, finance, GDPR, google, Hardware, identity, intelligence, law, microsoft, monitoring, network, office, privacy, regulation, resilience, risk, soc, software, strategy, technology, threat, toolThales Named a Leader in the Data Security Posture Management Market madhav Thu, 09/25/2025 – 06:15 Most breaches begin with the same blind spot: organizations don’t know precisely what data they hold, or how exposed it is. Value and risk sit side by side. Data Security Todd Moore – Global VP of Data Security Products…
-
Evolved PXA Stealer wraps PureRAT in multi-layer obfuscation
Telegram and the Vietnamese infrastructure led to attribution: Metadata within exfiltrated ZIP archives pointed to @LoneNone, a Telegram handle previously associated with PXA Stealer. That same alias had appeared in earlier Cisco and SentinelOne reporting, and Validin also tied PureRAT infrastructure to Vietnamese actors, researchers noted.James Northey, SOC analyst and lead author of the report,…
-
Building a stronger SOC through AI augmentation
In this Help Net Security interview, Tim Bramble, Director of Threat Detection and Response at OpenText, discusses how SOC teams are gaining value from AI in detecting and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/24/tim-bramble-opentext-ai-soc-value/
-
Exposed Docker Daemons Fuel DDoS Botnet
The for-hire platform leverages legitimate cloud-native tools to make detection and disruption harder for defenders and SOC analysts. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/exposed-docker-daemons-fuel-ddos-botnet
-
Building SaaS Features for Enterprise Readiness
Make your SaaS enterprise-ready! Learn how to build essential features like SSO, SAML, OIDC, and achieve SOC 2 compliance for security and scalability. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/building-saas-features-for-enterprise-readiness/
-
How Major SOCs Achieve Early Threat Detection in 3 Steps
Every SOC leader understands that faster threat detection is better. But the difference between knowing it and building… First seen on hackread.com Jump to article: hackread.com/how-major-socs-achieve-threat-detection-3-steps/
-
Anton’s Security Blog Quarterly Q3 2025
Tags: ai, automation, breach, ciso, cloud, cyber, defense, detection, edr, google, governance, guide, metric, office, RedTeam, risk, siem, soc, software, supply-chain, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog / podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify). Gemini for docs based on this blog Top 10 posts with the most…
-
Top 10 Best Cybersecurity Compliance Management Software in 2025
Cybersecurity compliance has become a mission-critical part of modern business operations. With the rise of data privacy laws, global regulations, and increasing cyber threats, organizations need reliable compliance management software to stay secure and audit-ready. The best compliance platforms streamline frameworks like SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR, and more while automating workflows,…
-
CaptureFlag Competition Leads to Cybersecurity Career
As Splunk celebrates the 10th anniversary of Boss of the SOC competition, it continues to be a valuable platform for security professionals to test their skills, learn new techniques, and potentially advance their careers. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-careers/capture-the-flag-leads-cybersecurity-careers
-
CSO Awards winners highlight security innovation and transformation
Tags: ai, attack, automation, awareness, best-practice, business, ciso, cloud, compliance, conference, control, cyber, cybersecurity, data, defense, detection, finance, flaw, framework, governance, group, guide, infrastructure, intelligence, login, malicious, metric, mitre, network, penetration-testing, phishing, privacy, programming, risk, risk-management, service, siem, skills, soc, software, technology, threat, tool, training, update, vulnerability, vulnerability-managementFSU tackles third-party risk with tighter vendor management program: Organization: Florida State UniversityProject: Third-Party Risk Management ProgramSecurity leader: Bill Hunkapiller, CISOOfficials at Florida State University wanted to ensure that data shared with outside entities was well protected. To achieve that, CISO Bill Hunkapiller and his team revamped its third-party risk management program so that the…
-
Capture the Flag Competition Leads to Cybersecurity Career
As Splunk celebrates the 10th anniversary of Boss of the SOC competition, it continues to be a valuable platform for security professionals to test their skills, learn new techniques, and potentially advance their careers in cybersecurity. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-careers/capture-the-flag-leads-cybersecurity-careers
-
The Messy Middle: Where SOC Automation Breaks (and How Morpheus AI Fixes It)
SOC automation breaks in the messy middle of triage and investigation. Learn how Morpheus AI fixes it with transparent, adaptive playbooks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/the-messy-middle-where-soc-automation-breaks-and-how-morpheus-ai-fixes-it/
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
AI is altering entry-level cyber hiring, and the nature of the skills gap
The certification trap and broken pipelines: Other experts argued that an over reliance on CVs and certifications is one of the biggest barriers to hiring success in cybersecurity because it acts to shut out otherwise qualified candidates.”Despite bringing valuable experience and perspectives, people with 10 years of work experience are put off because there is…
-
Product showcase: Exaforce The full lifecycle AI SOC platform
Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/18/product-showcase-exaforce-ai-soc-platform/
-
Hack the Box acquires LetsDefend for blue team upskilling
Hack The Box (HTB), a provider of gamified cybersecurity skills development, has announced the acquisition of LetsDefend, a pioneering blue team training platform known for its hands-on SOC simulations and growing community members. The company said the combination of the two companies >>will offer hands-on labs, real-world simulations and cross-role skill development to empower enterprises,…
-
FIRESIDE CHAT: The case for AI-Native SOCs built to take action, not just observe and alert
The raw attack surface isn’t just growing. It’s fragmenting. Logs from SaaS apps, cloud workloads, and third-party services flood security stacks already straining to keep up. Security teams are buried in alerts they can’t triage fast enough. Meanwhile, adversaries probe… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/fireside-chat-the-case-for-ai-native-socs-built-to-take-action-not-just-observe-and-alert/
-
George Kurtz’s 5 Boldest AI Statements At CrowdStrike Fal.Con 2025
CrowdStrike is making its next moves in AI including with a focus on enabling a Security Operations Center (SOC) that is fundamentally powered by agentic technologies, the “agentic SOC,” CrowdStrike co-founder and CEO George Kurtz said Tuesday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/george-kurtz-s-5-boldest-ai-statements-at-crowdstrike-fal-con-2025
-
CrowdStrike bets big on agentic AI with new offerings after $290M Onum buy
Tags: ai, api, ciso, control, crowdstrike, cybersecurity, data, data-breach, detection, marketplace, password, risk, service, soc, trainingCrowdStrike’s Agentic Security Platform: CrowdStrike developed its Agentic Security Platform precisely to help organizations keep pace with increasingly AI-equipped adversaries. “The increasing speed of the adversary, the increasing use of generative AI means from a defensive standpoint, we want to leverage these technologies as well to match and hopefully exceed the speed and efficiency of…

