Sponsor of the Day:
Jerkmate
https://www.socinvestigation.com/author/soc-csirt/
SOC CSIRT - Security Investigation
security investigationsoccsirt
https://www.socinvestigation.com/how-email-encryption-protects-your-privacy/
How Email Encryption Protects Your Privacy - Security Investigation
Aug 17, 2024 - If someone mediates your messages, your information could be compromised. Because of safety concerns, organizations and people are using email encryption to...
email encryptionprivacy securityprotectsinvestigation
https://nira.com/google-security-investigation-tool-guide/
How to use Google’s Security Investigation Tool for Google Drive
Jan 16, 2024 - The complete guide to Google's Security Investigation Tool and how to use it to identify and remediate security threats in Google Drive.
security investigationgoogle driveusetool
https://www.socinvestigation.com/threat-hunting-playbooks-for-mitre-tactics/
Threat Hunting Playbooks For MITRE TACTICS - Security Investigation
threat huntingsecurity investigationplaybooksmitretactics
https://workspaceupdates.googleblog.com/2021/10/virustotal-security-investigation-tool-integration.html
Google Workspace Updates: VirusTotal integration with the security investigation tool provides...
google workspace updatessecurity investigationvirustotalintegrationtool
https://www.socinvestigation.com/mitre-d3fend-knowledge-guides-to-design-better-cyber-defenses/
MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses - Security Investigation
Aug 12, 2025 - OVERVIEW MITRE is an American-based nonprofitable organization whose main focus is to develop multiple security frameworks for both offense and defense...
design bettercyber defensessecurity investigationmitreknowledge
https://www.socinvestigation.com/redline-stealer-returns-with-new-ttps-detection-response/
RedLine Stealer returns with New TTPS – Detection & Response - Security Investigation
Feb 17, 2023 - Redline Stealer is a type of malware that steals sensitive information from infected computers. The malware is known for its ability to bypass antivirus...
redline stealerdetection responsesecurity investigationreturnsnew
https://www.socinvestigation.com/how-to-detect-malware-hijacking-digital-signatures/
How to Detect Malware Hijacking Digital signatures - Security Investigation
Feb 20, 2026 - Hijacking digital signatures is a form of cyber attack where an attacker gains unauthorized access to a digital signature and uses it to sign and distribute...
detect malwaredigital signaturessecurity investigationhijacking
https://www.ntop.org/security-investigation-for-beginners-using-ntopng/
Security Investigation for Beginners (using ntopng) – ntop
security investigationbeginners usingntopng
https://www.socinvestigation.com/cve-2023-21554-hunt-for-msmq-queuejumper-in-the-environment/
CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment - Security Investigation
Apr 13, 2023 - Check Point Research recently discovered three vulnerabilities in the Microsoft Message Queuing service commonly known as MSMQ. These vulnerabilities were...
cve 2023environment securityhuntmsmqinvestigation
https://krebsonsecurity.com/page/3/
Krebs on Security – Page 3 – In-depth security news and investigation
depth newskrebssecurity3investigation
https://optimumsecurity.ca/security-services/investigation-and-risk-management/
Investigation and Risk Management | Optimum Security
risk managementinvestigationoptimumsecurity
https://www.rferl.org/a/ukraine-cameras-china-security-risks-hikvision-dahua-schemes-investigation/32810571.html
Investigation: China's Hikvision, Dahua Security Cameras Heighten Risks Of Russian Attacks On...
Testing of Hikvision and Dahua CCTV cameras indicated that certain models are vulnerable to hacking and, in some cases, transmit information to servers...
security camerasrussian attacksinvestigationchinahikvision