Latest posts tagged with #Soc on Bluesky
Was fucking around with brush settings in Clip studio and Brekker just kind of showed up cuz I've had Six of Crows on the mind recently.
Turn up your phone brightness to perceive this bullshit lmao
#SoC #KazBrekker
Rockchip presenta sus nuevos SOC RK3538 y RK3572 para Android TV-Box El panorama de los SoC para Android TV-Box lleva estancado ya años y se agradece algo de info nueva; en este caso no hacemos ec...
#SOC #y #Procesadores #SOC
Origin | Interest | Match
Phishing campaigns are being designed to overload SOC workflows, extending investigations from minutes to many hours and raising breach likelihood, reports The Hacker News. #phishing #SOC #AI https://bit.ly/4rrYYwn
#California reacted by activating the state operations center, or #SOC, when the war began to monitor potential threats to the state, coordinate with local officials, and prepare for “worst-case scenarios.” www.sfchronicle.com/california/a...
With #OpenSearch Security Analytics, the security log data from your critical infrastructure can provide insight into potential risks to your systems, users, confidential data, and applications.
Learn how: https://opensearch.org/platform/security-analytics/
#Securityanalytics #SOC #threatdetection
RobinReach
1.8B credentials stolen by infostealers in H1 2025. They harvest cookies, tokens and metadata — then live off the land. No malware, no alerts.
The only way to find them? Hunt.
Never Hunt Alone
#cybersecurity #threathunting #infostealers #SOC
Cloud breaches are moving faster—but so is AI.
LLMs can now analyze millions of logs, detect anomalies, and automatically reconstruct full attack timelines.
Is this the end of manual incident investigation?
#CloudSecurity #AIForensics #CyberDefense #SOC #Azure #AWS #CloudDai
iT4iNT SERVER How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs VDS VPS Cloud #PhishingDetection #Cybersecurity #CISO #SOC #InformationSecurity
iT4iNT SERVER How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs VDS VPS Cloud #PhishingDetection #Cybersecurity #CISO #SOC #InformationSecurity
Enhance your SOC's early threat detection without adding staff. Discover how fresh, actionable threat intelligence can transform your security operations. #CyberSecurity #ThreatIntelligence #SOC Link: thedailytechfeed.com/enhanced-soc...
iT4iNT SERVER Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload VDS VPS Cloud #CyberSecurity #Phishing #SOC #ThreatIntelligence #DataBreach
How to Become a SOC Analyst as a Fresher Cybersecurity is one of the fastest-growing fields in technology, and the role of a Security Operations Center (SOC) Analyst is often the… Continue readin...
#career-advice #tryhackme #soc #information-security #cybersecurity
Origin | Interest | Match
💥 #SOC = +16%
Trump to invoke emergency law for offshore oil producer Sable
🛡️ SOC Analyst Bootcamp: From Beginner to Job-Ready
Start your journey in cybersecurity and SOC operations. Learn how security analysts monitor systems, detect threats, and respond to real security incidents.
#soc #security
🔗 Course details:
coursecouponclub.com/soc-analyst-...
Investigation Scenario 🔎
A host on your network executed the command “netsh wlan show profile” for the first time.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
astricks.com/cisco-secure...
Cisco Secure Firewall Management Center Authentication Bypass Vulnerability
#CyberSecurity
#InfoSec
#NetworkSecurity
#CyberThreats
#VulnerabilityManagement
#SecurityAdvisory
#AuthenticationBypass
#ZeroDay
#ThreatIntelligence
#SecurityOperations
#SOC
Things I’ve heard that made me uncomfortable:
“We disabled the alert because it kept going off.”
#SecurityOperations #SOC #ThingsIHeard
🤯 Lab madness! 🤯
Built a SIEM & SOAR, now rocking a full NOC/SOC setup.
Cybersecurity rants incoming, plus some Linux love. 🔴
Watch the chaos unfold! #Cybersecurity #Linux #SOC
https://kick.com/chiefgyk3d
🤯 Lab madness! 🤯
Built a SIEM & SOAR, now rocking a full NOC/SOC setup.
Cybersecurity rants & Linux tinkering incoming.
Watch the chaos unfold! 🔴 #Cybersecurity #Linux #SOC
https://youtube.com/@chiefgyk3d/live
🤯 Lab madness! 🤯
Built a SIEM & SOAR, now running a full NOC/SOC in my lab.
Cybersecurity rants incoming!
Linux tinkering too.
Watch the chaos unfold. 🔴 #Cybersecurity #Linux #SOC
https://twitch.tv/chiefgyk3d
Security operations centre
www.ekascloud.com/training-cou...
#SecurityOperationsCentre #SOC #CyberSecurity #NetworkSecurity #InfoSec #ThreatDetection #CyberDefense #ITSecurity #SecurityAnalyst #TechCareers #Ekascloud #CyberSecurityTraining #DigitalSecurity 🔐💻
Boost your SOC's efficiency by enhancing collaboration between triage and response teams. Reduce MTTR and mitigate business risks effectively. #CyberSecurity #SOC #MTTR #IncidentResponse Link: thedailytechfeed.com/streamlining...
🛡️ IA #ciberseguridad 2026: El ascenso de los #Agentic #SOC frente a la amenaza de los ataques autónomos de nueva generación www.newstecnicas.info.ve/2026/03/ia-c...
Read the full interview:
www.technadu.com/testing-fast...
Do you think AI-driven detection will significantly reduce Mean Time to Response (MTTR) for SOC teams? Share your thoughts in the comments.
#InternationalWomensDay #WomenInCybersecurity #GenAI #ThreatDetection #SOC #CyberDefense #TechNadu
How can AI compress the gap between detection and defense?
In TechNadu’s LeadHer in Security interview, Neha Garg, CEO & Co-Founder of Arambh Labs, explains:
“In a startup, ambiguity is the default, not the exception.”
#WomenInCybersecurity #GenAI #CyberDefense #SOC
Il SOC è morto? l’AI sta riscrivendo la cybersecurity con il SOC Cognitivo
📌 Link all'articolo : www.redhotcyber.com/post/il-...
#redhotcyber #news #cybersecurity #intelligenzaartificiale #securityoperationscenter #soc #cognitivo
Enhance your SOC's frontline defense by empowering Tier 1 analysts with actionable threat intelligence and seamless tool integration. #CyberSecurity #SOC #ThreatIntelligence #CISO Link: thedailytechfeed.com/improving-ti...
iT4iNT SERVER Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow VDS VPS Cloud #CyberSecurity #SOC #CISO #ThreatDetection #SecurityOperations
Investigation Scenario 🔎
Your SIEM flags an OAuth consent grant to “Adobe Secure Share” from a user's M365 account at 07:13 AM. The audit log shows consent to files.readwrite.all.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC