Mayura

5 POSTS

Exclusive articles:

Understanding WAF Log Structure and Critical Fields for SOC Teams

Web Application Firewall (WAF) logs are a rich source of security telemetry, capturing detailed information about HTTP/S requests and the actions taken to protect...

Setting Up MITRE ATT&CK Use Cases in Your SOC

The MITRE ATT&CK framework represents one of the most valuable resources for modern Security Operations Centers (SOCs), providing a comprehensive knowledge base of adversarial...

Breaking

Critical AnythingLLM Vulnerability Enables Remote Code Execution

A critical vulnerability (CVE-2024-13059) in the open-source AI framework...

Microsoft Blocks Billions of Dollars in Scam and Fraudulent Activities

Microsoft reported a significant escalation in its cybersecurity efforts,...

State-Sponsored Hackers Widely Deploy ClickFix Attack in Espionage Campaigns

Security researchers have observed multiple state-sponsored hacking groups across...

Exposed KeyPlug Malware Staging Server Contains Fortinet Firewall and VPN Exploitation Scripts

The sophisticated threat actors, a briefly misconfigured directory on...
spot_imgspot_img