SOC_Prime Profile Banner
SOC Prime Profile
SOC Prime

@SOC_Prime

Followers
5K
Following
535
Media
3K
Statuses
6K

The world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community.

United States
Joined June 2015
Don't wanna be here? Send us removal request.
@SOC_Prime
SOC Prime
3 days
New Epsilon Red ransomware campaign targets users worldwide via fake ClickFix verification pages. Threat actors impersonate popular platforms to lure victims into running HTA files via ActiveX. Detects attacks with Sigma rules from SOC Prime Platform.
Tweet card summary image
socprime.com
Detect new Epsilon red ransomware attacks using a ClickFix-themed malware delivery page with a set of Sigma rules from SOC Prime Platform.
0
1
2
@SOC_Prime
SOC Prime
4 days
SOC Prime helped Deloitte Brazil to deliver SOC content 3X faster, boosting threat detection speed against emerging threats by 200%. Explore more at
0
0
0
@SOC_Prime
SOC Prime
5 days
The FBI, CISA, and partners warn of a rising Interlock ransomware threat increasingly targeting different industry verticals globally. Detect potential attacks against your infrastructure with Sigma rules in the SOC Prime Platform.
Tweet card summary image
socprime.com
Detect Interlock ransomware activity covered in CISA’s aa25-203a alert using a set of Sigma rules in the SOC Prime Platform.
0
1
5
@SOC_Prime
SOC Prime
7 days
⚠️ Actively exploited Microsoft SharePoint zero-day alert! CVE-2025-53770 is hitting hard—use Sigma rules in the SOC Prime Platform to detect exploitation attempts.
Tweet card summary image
socprime.com
Detect CVE-2025-535770 exploitation attempts, a new critical Microsoft SharePoint zero-day exploited in the wild, with Sigma rules from SOC Prime Platform.
0
1
1
@SOC_Prime
SOC Prime
7 days
Risk-optimize your cybersecurity posture with SOC Prime & AWS! Leverage zero-trust, multi-cloud, and cost-efficient security operations to enhance resilience against evolving threats. Explore more:
Tweet media one
0
0
2
@SOC_Prime
SOC Prime
10 days
CERT-UA warns of the latest attacks by APT28 targeting defense sector with LLM-powered LAMEHUG malware. Detect associated malicious activity with a set of Sigma rules in the SOC Prime Platform.
Tweet card summary image
socprime.com
Detect UAC-0001 (APT28) attacks using LLM-powered LAMEHUG malware covered in the CERT-UA#16039 alert with Sigma rules from SOC Prime Platform.
0
0
0
@SOC_Prime
SOC Prime
13 days
The Interlock ransomware group is back with a new PHP-based variant of NodeSnake RAT (aka Interlock RAT), deployed via FileFix. Detect targeted activity across multiple industry sectors with curated Sigma rules from SOC Prime Platform.
Tweet card summary image
socprime.com
Detect Interlock ransomware group attacks deploying a new PHP-based RAT via FileFix with curated Sigma rules from SOC Prime Platform.
0
0
1
@SOC_Prime
SOC Prime
19 days
Detect BERT ransomware—a novel threat targeting both Linux and Windows systems across Europe, Asia, and North America—using a set of Sigma rules in the SOC Prime Platform.
Tweet card summary image
socprime.com
Detect BERT ransomware attacks against your organization using a set of Sigma rules in the SOC Prime Platform.
0
0
2
@SOC_Prime
SOC Prime
19 days
Struggling to tackle a technical challenge, issue, or task in SIEM, EDR, or Data Lake? Check out Knowledge Bits by SOC Prime experts for crisp, actionable insights to solve common hurdles.
Tweet media one
0
0
1
@SOC_Prime
SOC Prime
20 days
Ready to write your first #Sigma rule? Our beginner’s guide breaks down the basics—Sigma taxonomy, core rule components, and testing steps to get you started!.
Tweet card summary image
socprime.com
Sigma rules guidance on using this detection language backed by time-tested best practices from the SOC Prime’s expert Adam Swan.
0
0
3
@SOC_Prime
SOC Prime
24 days
Heads up—CitrixBleed 2 reopens old wounds! CVE-2025-5777 puts NetScaler ADC at high risk, enabling user session hijacks & auth bypass. Detect potential exploitation attempts with the latest Sigma rule from SOC Prime Platform.
Tweet card summary image
socprime.com
Detect CVE-2025-5777 exploitation attempts, a new critical NetScaler ADC vulnerability, with a curated Sigma rule from SOC Prime Platform.
0
1
4
@SOC_Prime
SOC Prime
24 days
Security research made simple! Register to SOC Prime Platform and get instant access to active threat insights, open-source Sigma rules, AI-powered search across world's largest rules library, Uncoder AI — everything 100% free. Start now:
Tweet media one
0
0
2
@SOC_Prime
SOC Prime
25 days
What is detection engineering, and why does it matter for cyber resilience? Find these answers in our dedicated blog article!
Tweet card summary image
socprime.com
Learn about Detection Engineering, its benefits, and what role it plays in boosting the organization’s cyber defense backed by SOC Prime Platform.
0
0
1
@SOC_Prime
SOC Prime
27 days
Welcoming Anetac to the SOC Prime Ecosystem! This new partnership brings together Anetac’s identity vulnerability management capabilities with SOC Prime’s expertise and technology to help security teams proactively defend against identity-based threats.
Tweet card summary image
socprime.com
SOC Prime and Anetac announce partnership to strengthen identity security and combat identity-based enterprise threats.
0
0
1
@SOC_Prime
SOC Prime
1 month
Outsmart adversaries with SOC Prime's hands-on training based on real-life scenarios. Dive into critical concepts, improve practical skills, and accelerate threat hunting and detection engineering maturity through enhanced expertise. Learn more:
Tweet card summary image
my.socprime.com
Accelerate threat hunting and detection engineering maturity with SOC Prime’s training based on real-life scenarios.
0
1
4
@SOC_Prime
SOC Prime
1 month
Want to master hypothesis-driven threat hunting? Our step-by-step guide explains how to create hypotheses for everything from suspicious files to #APT activity.
Tweet card summary image
socprime.com
Threat hunting starts with a threat hunting hypothesis. Explore our how-to article to gain insights into hypothesis-driven threat hunting.
0
0
1
@SOC_Prime
SOC Prime
1 month
Search across 400K+ CTI-enriched detections using Light Search, an ultra-fast engine connecting your queries to most relevant search results in 0.5 seconds. Start now:
0
0
2
@SOC_Prime
SOC Prime
1 month
Join us on July 3, 9 AM EDT / 3 PM CEST for the “Mastering Detection Engineering With AI”. Explore practical, hands-on use cases of how cyber defenders can use AI to automate and enhance detection engineering end-to-end . 📅 Save your seat now:
Tweet media one
0
0
1
@SOC_Prime
SOC Prime
1 month
Mocha Manakin uses paste and run with PowerShell to deploy a custom NodeJS backdoor, NodeInitRAT—a foothold that could escalate to ransomware. Proactively detect malicious activity with curated Sigma rules available on the SOC Prime Platform.
Tweet card summary image
socprime.com
Detect Mocha Manakin past-and-run attacks spreading a custom NodeJS backdoor, NodeInitRAT, with Sigma rules from SOC Prime Platform.
0
1
3