Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2023

How Torq Remediates the 3CX Supply Chain Attack

By Dallas Young Sr. Technical Marketing Manager, Torq According to researchers, the 3CX Voice over Internet Protocol (VoIP) desktop program for Windows and MacOS, which boasts over 600,000 customers and 12m daily users, has been compromised by a DLL sideloading attack and used in several supply chain attacks. 3CX is a private branch exchange (PBX) system, a private telephone network used within a company or organization.

How Do You Staff a SOC Over the Holidays?

It’s natural for people to let down their guard when hunting for great deals or responding to one-time requests from coworkers trying to plan their vacations. But threat actors don’t take time off, and as recent history has shown from Log4J and Kaseya attacks, attackers are poised to do the most damage when their targets are off celebrating outside the office.

A Practical Guide for Becoming a SOC Analyst

Practical Experience is important in getting cybersecurity work, and a home lab is a great option, but how do you do this for a SOC Analyst or cyber defender lab? Eric Capuano of Recon Infosec spells it out in a blog post. In this video, Dr. Gerald Auger shows you exactly why this Home SOC lab will give you an incredible advantage in learning practical cybersecurity skills.

How Continuous Threat Hunting Addresses Potential Okta Password Exposure Via Failed Login Attempts

Last week, the incident response firm Mitiga published research outlining the potential exposure of Okta passwords of organizational users. The method involves a mistaken entry of one’s password in the username field in an Okta login interface – something that, according to the research, is not an infrequent occurrence.

SOCtails - Unify Security Operations with Splunk Mission Control

Security teams constantly pivot between multiple tools and management consoles in order to detect, investigate, and respond to security incidents. It's time-consuming and complex. And it's Kevin's personal nightmare. Jeff shows Kevin how to unify his security operations across detection, investigation and response using Splunk Mission Control.

Unify Your Security Operations with Splunk Mission Control

Splunk Mission Control brings order to the chaos of your security operations by enabling your SOC to detect, investigate and respond to threats from one modern and unified work surface. Watch this 5 minute demo video to learn how Mission Control unifies your security operations experience across Splunk’s industry-leading security technologies and partner ecosystem in one work surface. The demo use case focuses on how an analyst detects, investigates and responds to an encoded PowerShell attack.

Security Operations Maturity Model I : Measuring SOC performance

Companies need to measure performance in all areas of operations to check whether they are proving cost-effective and achieving the desired results. One of the best ways for security managers to demonstrate that their security operations program is aligned with business objectives is to use metrics that demonstrate efficiency and effectiveness.

Silicon Valley Bank Fallout - Arctic Wolf News Break

Silicon Valley Bank (SVB) experienced a rapid implosion last week. While many are discussing the immediate financial impacts to bank accounts and the larger impact on banking in general, it’s important to note that there will likely be a secondary impact. Learn what individuals and customers of SVB should be expecting from a cybersecurity perspective. Learn how Arctic Wolf can help prepares your employees to recognize and neutralize social engineering attacks and human error—helping to end cyber risk at your organization.

3 Ways to Improve Your Security Operations

As cybercrime continues to grow and organizations digitize, understanding cybersecurity and how to improve one’s security posture becomes paramount. Unfortunately, the firewall has dissolved and tools alone, though helpful, can’t protect environments when public sector organizations are understaffed, underfunded, and struggling to maintain compliance.

What Keeps Cybersecurity Leaders Up At Night: A Global Perspective

Our research shows that 48% of security leaders are worried about a cloud breach, and they have reason to worry if their cloud security isn’t ready for potential threats. Join us for a LinkedIn Live as we dig into the data from our “Global Uncertainty” survey and offer up next steps for organizations to ease their cybersecurity concerns and start securing their systems.