360 SOC – Award Winning Managed Security Service Provider

Recent From Blog

We have built a reputation for becoming the #1 choice for businesses and organizations looking for managed security services, security auditing, security assessing, security consulting, security design, vendor sourcing, implementation, and remediation services.

Uncategorized

Lincoln College to Close, Hurt by Pandemic and Ransomware Attack

By Christine Chung Published May 9, 2022U pdated May 10, 2022, 2:33 p.m. ET Lincoln College, a predominantly Black college in Illinois, will close this week after 157 years, saying it could not survive the financial challenges of the coronavirus pandemic and a ransomware attack last year. “The loss of history, careers, and a community …

Lincoln College to Close, Hurt by Pandemic and Ransomware Attack Read More »

U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities

Log4Shell, ProxyShell, ProxyLogon, ZeroLogon, and flaws in Zoho ManageEngine AD SelfService Plus, Atlassian Confluence, and VMware vSphere Client emerged as some of the top exploited security vulnerabilities in 2021. That’s according to a “Top Routinely Exploited Vulnerabilities” report released by cybersecurity authorities from the Five Eyes nations Australia, Canada, New Zealand, the U.K., and the …

U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities Read More »

CISA, FBI, NSA AND INTERNATIONAL PARTNERS ISSUE ADVISORY ON RANSOMWARE TRENDS FROM 2021

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory outlining the growing international threat posed by ransomware over the past year. The advisory titled “2021 …

CISA, FBI, NSA AND INTERNATIONAL PARTNERS ISSUE ADVISORY ON RANSOMWARE TRENDS FROM 2021 Read More »

‘The Internet Is on Fire’ A vulnerability in the Log4j logging framework has security teams scrambling to put in a fix.

A VULNERABILITY IN a widely used logging library has become a full-blown security meltdown, affecting digital systems across the internet. Hackers are already attempting to exploit it, but even as fixes emerge, researchers warn that the flaw could have serious repercussions worldwide.  The problem lies in Log4j, a ubiquitous, open source Apache logging framework that developers …

‘The Internet Is on Fire’ A vulnerability in the Log4j logging framework has security teams scrambling to put in a fix. Read More »

U.S. offers $10 million reward in hunt for DarkSide cybercrime group

Nov 4 (Reuters) – The U.S. State Department on Thursday announced a reward of up to $10 million for information leading to the identification or location of anyone with a key leadership position in DarkSide, a cybercrime organization the FBI has said is based in Russia. The FBI has said DarkSide was responsible for the …

U.S. offers $10 million reward in hunt for DarkSide cybercrime group Read More »

Welcome to the Team!

Excited to announce our 4 New Hires for April.  Vicky Ross, Robert Schull, Natalie Yarbourgh will be joining our SOC Analyst Development Program at our Prescott office and Connor Mindak started as Business Development Representative in our Phoenix Office. Soon we will also announce our 2021 Board Member Additions. We are growing…Looking to Join an …

Welcome to the Team! Read More »

10 Things We Learned About the Solarwinds Breach (FireEye)

Ten things we learned or were reminded of with the Solarwinds breach: 1. Without Searchable Logs “you were screwed” or no logs at all…..made it impossible to historically investigate. 2. Cloud SOC Platforms made it nearly impossible to go outside of 30-90 days to find the breach. Huge dilemma for the hosting providers. This incident …

10 Things We Learned About the Solarwinds Breach (FireEye) Read More »

Solarwinds Breach Information

Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements. Some of these tools appear to be based on well-known offensive frameworks like Cobalt Strike. This is even evident in the naming convention used …

Solarwinds Breach Information Read More »

360 SOC Announces the 6 PILLARS to 360 SOC’s MDR SUCCESS!

360 SOC Announces the 6 PILLARS to 360 SOC’s MDR SUCCESS!  WE INGEST, WE ENRICH, WE AUTO TRIAGE THE NOISE, WE USE HUMANS TO TRIAGE 24×7 ACTIVE USE CASE ALERTS, WE HUNT AND CARVE YOUR DATA, and WE PROVIDE ACTIONABLE REPORTING…… Want to learn more…..Let’s TALK! #MDR #SIEM #UEBA #SOAR #NDR #PACKET #EDR #VULNERABILITYMANAGEMENT   6 Pillars:  Alert Ingested, Advanced Alert Enrichment, Automated …

360 SOC Announces the 6 PILLARS to 360 SOC’s MDR SUCCESS! Read More »