
SOC Prime
@SOC_Prime
Followers
5K
Following
535
Media
3K
Statuses
6K
The world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community.
United States
Joined June 2015
New Epsilon Red ransomware campaign targets users worldwide via fake ClickFix verification pages. Threat actors impersonate popular platforms to lure victims into running HTA files via ActiveX. Detects attacks with Sigma rules from SOC Prime Platform.
socprime.com
Detect new Epsilon red ransomware attacks using a ClickFix-themed malware delivery page with a set of Sigma rules from SOC Prime Platform.
0
1
2
The FBI, CISA, and partners warn of a rising Interlock ransomware threat increasingly targeting different industry verticals globally. Detect potential attacks against your infrastructure with Sigma rules in the SOC Prime Platform.
socprime.com
Detect Interlock ransomware activity covered in CISA’s aa25-203a alert using a set of Sigma rules in the SOC Prime Platform.
0
1
5
⚠️ Actively exploited Microsoft SharePoint zero-day alert! CVE-2025-53770 is hitting hard—use Sigma rules in the SOC Prime Platform to detect exploitation attempts.
socprime.com
Detect CVE-2025-535770 exploitation attempts, a new critical Microsoft SharePoint zero-day exploited in the wild, with Sigma rules from SOC Prime Platform.
0
1
1
CERT-UA warns of the latest attacks by APT28 targeting defense sector with LLM-powered LAMEHUG malware. Detect associated malicious activity with a set of Sigma rules in the SOC Prime Platform.
socprime.com
Detect UAC-0001 (APT28) attacks using LLM-powered LAMEHUG malware covered in the CERT-UA#16039 alert with Sigma rules from SOC Prime Platform.
0
0
0
The Interlock ransomware group is back with a new PHP-based variant of NodeSnake RAT (aka Interlock RAT), deployed via FileFix. Detect targeted activity across multiple industry sectors with curated Sigma rules from SOC Prime Platform.
socprime.com
Detect Interlock ransomware group attacks deploying a new PHP-based RAT via FileFix with curated Sigma rules from SOC Prime Platform.
0
0
1
Discover top #ThreatHunting techniques, tactics, and methodologies in our expert step-by-step guide!.
socprime.com
Wondering how to organize the threat hunting process effectively? Learn from this step-by-step instruction on the threat hunting techniques.
0
0
1
Detect BERT ransomware—a novel threat targeting both Linux and Windows systems across Europe, Asia, and North America—using a set of Sigma rules in the SOC Prime Platform.
socprime.com
Detect BERT ransomware attacks against your organization using a set of Sigma rules in the SOC Prime Platform.
0
0
2
Ready to write your first #Sigma rule? Our beginner’s guide breaks down the basics—Sigma taxonomy, core rule components, and testing steps to get you started!.
socprime.com
Sigma rules guidance on using this detection language backed by time-tested best practices from the SOC Prime’s expert Adam Swan.
0
0
3
Heads up—CitrixBleed 2 reopens old wounds! CVE-2025-5777 puts NetScaler ADC at high risk, enabling user session hijacks & auth bypass. Detect potential exploitation attempts with the latest Sigma rule from SOC Prime Platform.
socprime.com
Detect CVE-2025-5777 exploitation attempts, a new critical NetScaler ADC vulnerability, with a curated Sigma rule from SOC Prime Platform.
0
1
4
What is detection engineering, and why does it matter for cyber resilience? Find these answers in our dedicated blog article!
socprime.com
Learn about Detection Engineering, its benefits, and what role it plays in boosting the organization’s cyber defense backed by SOC Prime Platform.
0
0
1
Welcoming Anetac to the SOC Prime Ecosystem! This new partnership brings together Anetac’s identity vulnerability management capabilities with SOC Prime’s expertise and technology to help security teams proactively defend against identity-based threats.
socprime.com
SOC Prime and Anetac announce partnership to strengthen identity security and combat identity-based enterprise threats.
0
0
1
Outsmart adversaries with SOC Prime's hands-on training based on real-life scenarios. Dive into critical concepts, improve practical skills, and accelerate threat hunting and detection engineering maturity through enhanced expertise. Learn more:
my.socprime.com
Accelerate threat hunting and detection engineering maturity with SOC Prime’s training based on real-life scenarios.
0
1
4
Want to master hypothesis-driven threat hunting? Our step-by-step guide explains how to create hypotheses for everything from suspicious files to #APT activity.
socprime.com
Threat hunting starts with a threat hunting hypothesis. Explore our how-to article to gain insights into hypothesis-driven threat hunting.
0
0
1
Mocha Manakin uses paste and run with PowerShell to deploy a custom NodeJS backdoor, NodeInitRAT—a foothold that could escalate to ransomware. Proactively detect malicious activity with curated Sigma rules available on the SOC Prime Platform.
socprime.com
Detect Mocha Manakin past-and-run attacks spreading a custom NodeJS backdoor, NodeInitRAT, with Sigma rules from SOC Prime Platform.
0
1
3