SOC Level Up: Threat Hunting and Detection With Sigma

How to Write YARA Rules That Minimize False Positives

Top Cyber Threats to the Telecom Industry

Top Cyber Threats to the Manufacturing Sector

Automate Alert Triage and Response Tasks with Intezer EDR Connect

Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations 

Security ROI: Time & Resource Savings for IR/SOC Teams

New Conversation Hijacking Campaign Delivering IcedID

SOC Level Up: Introduction to Sigma Rules

Scale Incident Response with Detection Engineering: Intezer Detect & Hunt

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt