Sponsor of the Day:
Jerkmate
https://www.iaea.org/services/networks/flo
International Network of Front Line Officers and Organizations for Nuclear Security Detection (FLO...
international networkfront linenuclear securityofficersorganizations
https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_meterpreter_or_cobaltstrike_getsystem_service_install/
Meterpreter or Cobalt Strike Getsystem Service Installation - Security | Detection.FYI
Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation
cobalt strikeservice installationsecurity detectionmeterpretergetsystem
https://www.crowdstrike.com/en-us/platform/cloud-security/cdr/
CrowdStrike Falcon® Cloud Security: Cloud Detection and Response (CDR)
Mar 30, 2026 - Proactively detect and respond to emerging threats with CDR that combines elite threat intelligence and 24/7 services on a unified cloud security platform.
cloud securityresponse cdrcrowdstrikedetection
https://www.infosecurity-magazine.com/news/security-detection-tech-failing/
Security Detection Tech Failing, Say Cyber Leaders - Infosecurity Magazine
Jul 22, 2025 - A new Everfox survey shows a growing consensus among regulated organizations in favor of a strategic shift away from detecting cyber threats to preventing them
security detectionsay cyberinfosecurity magazinetechfailing
https://www.idquantique.com/
ID Quantique | Quantum-Safe Security & Quantum Detection Systems
ID Quantique is the world leader in quantum cybersecurity, and empowers researchers to create the quantum photonic building blocks of the Quantum Internet.
quantum safe securityid quantiquedetection systems
https://www.elastic.co/docs/reference/integrations/security_detection_engine
Prebuilt Security Detection Rules | Elastic integrations
The detection rules package stores the prebuilt security rules for the Elastic Security detection engine. To download or update the rules, click Settings...
security detectionelastic integrationsprebuiltrules
https://www.bibliotheca.com/solutions/security-detection/
Library Security Detection To Protect Your Physical Assets
library securityphysical assetsdetectionprotect
https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/oilrig/win_security_apt_oilrig_mar18/
OilRig APT Schedule Task Persistence - Security | Detection.FYI
Detects OilRig schedule task persistence as reported by Nyotron in their March 2018 report
security detectionaptscheduletaskpersistence
https://www.telecomsci.com/en/article/doi/10.11959/j.issn.1000-0801.2021263/
Architecture and practice of BGP internet routing visibility and security detection
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of today’s global internet for exchanging routing information.However, it was...
internet routingvisibility securityarchitecturepracticebgp
https://appexchange.salesforce.com/appxListingDetail?listingId=a0N4V00000IrHxUUAV
Varonis – Salesforce data security, compliance, threat detection, and auditing | Salesforce...
With Varonis, you can easily manage Salesforce permissions to sensitive data, monitor activity, and fix critical misconfigurations to reduce risk, maintain...
salesforce data securitycompliance threatvaronisdetectionauditing
https://oosto.com/use-case/perimeter-security/
Perimeter Security and Intrusion Detection Solutions | Oosto
Mar 22, 2023 - Oosto improves 4 levels of perimeter security: the perimeter or outside area, the entrance, the building or facility itself, and special cabinets or rooms.
perimeter securityintrusion detectionsolutionsoosto
https://graylog.org/post/graylog-security-anomaly-detection-metrics-ease-the-workload/
Graylog Security Anomaly Detection: Metrics Ease the Workload
Jun 2, 2023 - Discover How to Identify and Mitigate Unusual Patterns in Data. Dive into the world of anomaly detection and uncover the key techniques, algorithms, and tools...
anomaly detectiongraylogsecuritymetricsease
https://www.grab.careers/en/jobs/743999995458446/senior-security-engineer-cyber-defense-threat-detection/
Senior Security Engineer, Cyber Defense (Threat Detection), Jakarta, Indonesia | Grab Careers
Life at Grab At Grab, every Grabber is guided by The Grab Way, which spells out our mission, how we believe we can achieve it, and our operating principles -...
senior security engineercyber defensethreat detectionjakarta indonesiagrab careers
https://www.mitiga.io/platform
AI-Native Cloud Detection and Response (CDR) Platform for Cloud & SaaS Security | Mitiga
ai native cloudresponse cdrsaas securitydetectionplatform
https://www.avast.com/c-b-what-is-an-intrusion-detection-system
What is an IDS (Intrusion Detection System) | Network Security
intrusion detection systemnetwork securityids
https://www.precursorsecurity.com/services/defensive-security/managed-detection-response-mdr
Managed Detection & Response UK | 24/7 MDR | Precursor Security
Managed detection and response (MDR) from a 24/7 UK CREST-accredited SOC. Vendor-agnostic threat detection, hunting, and incident response. From £900/month.
managed detection responseuk 24 7precursor securitymdr
https://fidelissecurity.com/use-case/threat-detection/
Real-Time Threat Detection | Fidelis Security
Jan 14, 2026 - Proactively detect and stop threats in real-time, strengthen your security posture and protect against advanced cyber-attacks.
real time threatfidelis securitydetection
https://en.iclabcn.com/2340.html
Visible performance, longer lasting security | Chuangxin online detection, providing reliable...
In today's digital age, memory modules are the core components that support the efficient operation of devices. Their performance and stability directly...
longer lastingchuangxin onlineproviding reliablevisibleperformance
https://www.itgoat.com/managed-it-services/security-operations-center/24-7-threat-detection-mdr/
MDR Security Services | 24/7 Threat Detection & IT Response - IT GOAT
Oct 28, 2025 - 24/7 threat detection and response services. MDR identifies suspicious activity, hunts threats proactively, and responds to incidents fast.
services 24 7mdr securitythreat detectionresponsegoat
https://www.airsight.com/
Drone Detection Solutions | Airspace Security | AirSight
Secure your airspace with AirSight’s advanced drone/pilot detection solutions, trusted to protect critical operations. Explore cutting-edge security today.
drone detectionsolutionsairspacesecurity
https://www.pnnl.gov/radsummerschool
Radiation Detection for Nuclear Security | PNNL
Graduate students and advanced undergraduate students learn about radiation detection techniques related to nuclear security.
radiation detectionnuclear securitypnnl
https://www.elastic.co/blog/supervised-and-unsupervised-machine-learning-for-dga-detection
DGA Detection with Elastic Security supervised machine learning | Elastic Blog
Feb 12, 2026 - In this blog, we announce our first-ever supervised machine learning and security integration. This offers users a supervised ML solution package to detect...
supervised machine learningelastic securitydgadetectionblog
https://www.hcaptcha.com/blog
hCaptcha Blog | Bot Detection, Fraud & AI Security Insights
Insights on bot detection, fraud prevention, AI agents, and privacy-first security. Learn how to protect online services from abuse and emerging threats.
hcaptcha blogbot detectionai securityfraudinsights
https://www.getrealsecurity.com/solutions
Real-Time Deepfake Detection & Content Verification | GetReal Security
Detect and block GenAI-powered deception. GetReal Security stops fraudulent applicants, video call scams, and impersonation attacks to keep your organization...
real time deepfakedetection contentgetreal securityverification
https://www.bankinfosecurity.com/managed-detection-response-mdr-c-616/p-2
Page 2 - Managed Detection & Response - bank information security
managed detection responsebank information security2
https://www.itsecuritynews.info/contextual-anomaly-detection-in-quantum-resistant-mcp-transport-layers/
Contextual Anomaly Detection in Quantum-Resistant MCP Transport Layers - IT Security News
Explore how contextual anomaly detection secures MCP transport layers with quantum-resistant encryption. Learn to defend AI infrastructure against tool...
anomaly detectionquantum resistantsecurity newscontextualmcp
https://go.sysdig.com/Multi-Cloud-Threat-Detection-Falco-AWS.html
Multi-Cloud Threat Detection with Falco and AWS Security Hub CSPM
How Falco detects runtime threats and suspicious activity in Kubernetes environments
aws security hubmulti cloudthreat detectionfalcocspm
https://www.iomart.com/resource-centre/insights/cyber-security-insights
Cyber Security Insights | Threat Detection, Ransomware Protection & SOC | Iomart
Stay ahead of evolving cyber threats with Iomart’s Cyber Security Insights. Explore expert guidance on threat hunting, ransomware defence, managed firewalls,...
cyber security insightsthreat detectionransomware protectionsociomart
https://security.googleblog.com/2020/02/improving-malicious-document-detection.html
Google Online Security Blog: Improving Malicious Document Detection in Gmail with Deep Learning
google online securityblog improvingdeep learningmaliciousdocument
https://vigophotonics.com/applications/infrared-detectors-for-security-and-defense-applications/
Infrared Detection Solutions for Military and Defense Security | VIGO Photonics
Nov 12, 2025 - Explore cutting-edge infrared detectors tailored for military and defense applications at VIGO Photonics. Our technology ensures unparalleled precision in...
detection solutionsdefense securityvigo photonicsinfraredmilitary
https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_audit_log_cleared/
Security Eventlog Cleared | Detection.FYI
One of the Windows Eventlogs has been cleared. e.g. caused by
detection fyisecurityeventlogcleared
https://www.devicesecurity.io/threat-detection-c-595
Threat Detection Device Security
News and resources around building threat detection capabilities for enterprise security teams.. Device Security
threat detectiondevice security
https://expel.com/
Leading Managed Detection & Response (MDR) Security Services | Expel
Apr 16, 2026 - Expel is a recognized, leading managed detection and response (MDR) provider offering transparent service and a 17-minute MTTR on high/critical incidents.
managed detection responsemdr securityleadingservicesexpel
https://www.axis.com/en-us/solutions/perimeter-and-area-security
Perimeter security and intrusion detection
When it comes to protecting your people and your property, a proactive approach and real-time situational awareness are critical. No matter how large or small...
perimeter securityintrusion detection
https://docs.vlt.sh/cli/security
Security & Malware Detection | vlt /vōlt/
security malwaredetectionvlt
https://www.fortinet.com/blog/business-and-technology/addressing-security-challenges-with-network-detection-and-response
How Network Detection and Response Addresses 5 Critical Security Challenges | Fortinet Blog
Read about a few challenges security operation teams face along with areas of consideration for a successful NDR deployment.
network detection5 criticalsecurity challengesfortinet blogresponse
https://stackoverflow.com/questions/79929171/how-does-netflix-authentication-work-with-focus-on-device-detection-ip-range
security - How does Netflix authentication work (with focus on device detection + IP range based...
I'm trying to understand how large-scale authentication systems (like Netflix) implement user verification. Specifically, how are devices detected and...
authentication workdevice detectionip rangesecuritynetflix
https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_disable_security_tools/
Disable Security Tools | Detection.FYI
Detects disabling security tools
tools detection fyidisablesecurity
https://www.ox.security/blog/what-is-application-detection-and-response-adr/
What Is Application Detection and Response (ADR)? | OX Security
Application detection and response (ADR) is an emerging cybersecurity category that focuses on application visibility, protection, and remediation. ADR is a...
application detectionresponse adrox security
https://edgedelta.com/product/anomaly-detection
Advanced Anomaly Detection Tool - Improve Data Security
Detect and resolve incidents faster. Process log data with correlated context across all your services. Surface anomalous behavior the instant it occurs.
anomaly detection toolimprove dataadvancedsecurity