53:15 Inside Identity Breaches: Proven Detection Strategies by SOC Prime & Anetac SOC Prime 109 views - 4 months ago
49:27 Mastering Detection Engineering with AI: Practical Use Cases SOC Prime 485 views - 8 months ago
46:54 Context-Based Detection Engineering: Who Is Attacking You, and How Can You Defend? SOC Prime 299 views - 1 year ago
6:44 Contribute Roota and Sigma Rules to Threat Bounty via Uncoder AI SOC Prime 454 views - 1 year ago
46:44 Proactive Threat Detection & Automated Threat Hunting in the Era of Security Data Lakes: Part 2 SOC Prime 242 views - 1 year ago
43:29 Proactive Threat Detection & Automated Threat Hunting in the Era of Security Data Lakes: Part 1 SOC Prime 340 views - 1 year ago
33:34 SOC Prime Webinar: Unlock Your Detection Engineering Excellence SOC Prime 258 views - 1 year ago
39:06 Scaling Up Cyber Defense: Best Practices by SOC Prime and LogRhythm SOC Prime 177 views - 1 year ago
5:30 SOC Prime Threat Bounty Program: Interview with Program Member - Phyo Paing Htun SOC Prime 145 views - 2 years ago
58:07 SOC Prime Webinar: Estrategias Proactivas para la Excelencia en Ciberseguridad SOC Prime 139 views - 2 years ago
26:27 Truth behind Sigma Rules you have to know and facts that Florian Roth has twisted SOC Prime 2K views - 2 years ago
45:35 SOC Prime Webinar: Ideas for Detections, from Hypothesis to Hunt SOC Prime 264 views - 2 years ago
46:08 Maximizing SOC Efficiency in 2023: Useful Tricks Using SOC Prime Platform SOC Prime 938 views - 3 years ago
11:02 Sandworm ru APT Power Outage cyberattack MITRE ATT&CK, Sigma rules & IOC matching based on CERT-UA SOC Prime 1K views - 3 years ago
1:26 Satisnet & SOC Prime webinar demo 2 Microsoft Security: Armed and Ready for Cyber Warfare SOC Prime 321 views - 3 years ago
2:50 Satisnet & SOC Prime webinar demo 1 Microsoft Security: Armed and Ready for Cyber Warfare SOC Prime 192 views - 3 years ago
0:48 Hunt for Log4Shell with Azure Sentinel, the fastest way, find obfuscations SOC Prime 1.2K views - 4 years ago
5:16 Fastest way to hunt for Log4shell CVE-2021-44228 log4j vulnerability exploitation and attacks SOC Prime 1.7K views - 4 years ago
0:37 Log4Shell obfuscation detection with SIEM and detection pads method by Florian Roth SOC Prime 960 views - 4 years ago
0:58 Log4j CVE202144228 IOC Matching with GreyNoise and Uncoder CTI SOC Prime SOC Prime 414 views - 4 years ago
1:00:11 Stumbling Blocks in Detection Engineering: Moving Them to Go Onward & Beyond SOC Prime 612 views - 5 years ago
44:30 SOCPrime Session - HANDLE ZOOM BOMBINGS, MALWARE SPREADING, COVID19 PHISHING. SOC Prime 150 views - 5 years ago
47:57 Security Talks with SOC Prime: Seamless Threat Detection w/ Corelight & Threat Detection Marketplace SOC Prime 449 views - 5 years ago
1:03:01 Security Talks with SOC Prime: Too Much Information Security SOC Prime 315 views - 5 years ago
1:08:53 Security Talks with SOC Prime: Adventures in Mapping things to MITRE ATT&CK SOC Prime 454 views - 5 years ago
45:35 Security Talks with SOC Prime: Ideas for detections, from hypothesis to hunt SOC Prime 333 views - 5 years ago
56:50 Humio & SOC Prime Workshop: Identify Cybersecurity Threats in Real Time SOC Prime 687 views - 5 years ago
46:46 Weekly Talks on breaking news in cyber security (as of June 2020). SOC Prime 119 views - 5 years ago
5:38 SIEM integrations: Elastic, Splunk and Azure Sentinel with Threat Detection Marketplace (TDM) SOC Prime 1.3K views - 5 years ago
2:38 Search: Standard and Lucene at Threat Detection Marketplace (TDM) SOC Prime 168 views - 5 years ago
1:01:23 Azure Sentinel - Accelerated SIEM Transformation with Sigma SOC Prime 980 views - 5 years ago