360 SOC – Award Winning Managed Detection and Response

Experience
to design Custom
Cybersecurity

Author name: nex

U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities

Log4Shell, ProxyShell, ProxyLogon, ZeroLogon, and flaws in Zoho ManageEngine AD SelfService Plus, Atlassian Confluence, and VMware vSphere Client emerged as some of the top exploited security vulnerabilities in 2021. That’s according to a “Top Routinely Exploited Vulnerabilities” report released by cybersecurity authorities from the Five Eyes nations Australia, Canada, New Zealand, the U.K., and the …

U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities Read More »

CISA, FBI, NSA AND INTERNATIONAL PARTNERS ISSUE ADVISORY ON RANSOMWARE TRENDS FROM 2021

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory outlining the growing international threat posed by ransomware over the past year. The advisory titled “2021 …

CISA, FBI, NSA AND INTERNATIONAL PARTNERS ISSUE ADVISORY ON RANSOMWARE TRENDS FROM 2021 Read More »

‘The Internet Is on Fire’ A vulnerability in the Log4j logging framework has security teams scrambling to put in a fix.

A VULNERABILITY IN a widely used logging library has become a full-blown security meltdown, affecting digital systems across the internet. Hackers are already attempting to exploit it, but even as fixes emerge, researchers warn that the flaw could have serious repercussions worldwide.  The problem lies in Log4j, a ubiquitous, open source Apache logging framework that developers …

‘The Internet Is on Fire’ A vulnerability in the Log4j logging framework has security teams scrambling to put in a fix. Read More »

Welcome to the Team!

Excited to announce our 4 New Hires for April.  Vicky Ross, Robert Schull, Natalie Yarbourgh will be joining our SOC Analyst Development Program at our Prescott office and Connor Mindak started as Business Development Representative in our Phoenix Office. Soon we will also announce our 2021 Board Member Additions. We are growing…Looking to Join an …

Welcome to the Team! Read More »

Solarwinds Breach Information

Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements. Some of these tools appear to be based on well-known offensive frameworks like Cobalt Strike. This is even evident in the naming convention used …

Solarwinds Breach Information Read More »

360 SOC Announces the 6 PILLARS to 360 SOC’s MDR SUCCESS!

360 SOC Announces the 6 PILLARS to 360 SOC’s MDR SUCCESS!  WE INGEST, WE ENRICH, WE AUTO TRIAGE THE NOISE, WE USE HUMANS TO TRIAGE 24×7 ACTIVE USE CASE ALERTS, WE HUNT AND CARVE YOUR DATA, and WE PROVIDE ACTIONABLE REPORTING…… Want to learn more…..Let’s TALK! #MDR #SIEM #UEBA #SOAR #NDR #PACKET #EDR #VULNERABILITYMANAGEMENT   6 Pillars:  Alert Ingested, Advanced Alert Enrichment, Automated …

360 SOC Announces the 6 PILLARS to 360 SOC’s MDR SUCCESS! Read More »

Cybersecurity experts come together to fight coronavirus-related hacking

An international group of nearly 400 volunteers with expertise in cybersecurity formed on Wednesday to fight hacking Called the COVID-19 CTI League, for cyber threat intelligence, the group spans more than 40 countries and includes professionals in senior positions at such major companies as Microsoft Corp (MSFT.O) and Amazon.com Inc (AMZN.O). One of four initial …

Cybersecurity experts come together to fight coronavirus-related hacking Read More »

Coronavirus Is a New Challenge for Cybersecurity

By Silviu Stahie on Apr 20, 2020 If you think the COVID-19 epidemic means a respite from cyberattacks against companies, you’d be wrong. If anything, the situation is worse, as organizations divert resources to other parts of the business, leaving their infrastructure exposed. And the proof of that is the flurry of attacks against hospitals. It’s unhealthy …

Coronavirus Is a New Challenge for Cybersecurity Read More »

Scroll to Top