Robuta

Sponsor of the Day: Jerkmate
https://www.socinvestigation.com/author/soc-csirt/ SOC CSIRT - Security Investigation security investigationsoccsirt https://www.socinvestigation.com/how-email-encryption-protects-your-privacy/ How Email Encryption Protects Your Privacy - Security Investigation Aug 17, 2024 - If someone mediates your messages, your information could be compromised. Because of safety concerns, organizations and people are using email encryption to... email encryptionprivacy securityprotectsinvestigation https://nira.com/google-security-investigation-tool-guide/ How to use Google’s Security Investigation Tool for Google Drive Jan 16, 2024 - The complete guide to Google's Security Investigation Tool and how to use it to identify and remediate security threats in Google Drive. security investigationgoogle driveusetool https://www.socinvestigation.com/threat-hunting-playbooks-for-mitre-tactics/ Threat Hunting Playbooks For MITRE TACTICS - Security Investigation threat huntingsecurity investigationplaybooksmitretactics https://workspaceupdates.googleblog.com/2021/10/virustotal-security-investigation-tool-integration.html Google Workspace Updates: VirusTotal integration with the security investigation tool provides... google workspace updatessecurity investigationvirustotalintegrationtool https://www.socinvestigation.com/mitre-d3fend-knowledge-guides-to-design-better-cyber-defenses/ MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses - Security Investigation Aug 12, 2025 - OVERVIEW MITRE is an American-based nonprofitable organization whose main focus is to develop multiple security frameworks for both offense and defense... design bettercyber defensessecurity investigationmitreknowledge https://www.socinvestigation.com/redline-stealer-returns-with-new-ttps-detection-response/ RedLine Stealer returns with New TTPS – Detection & Response - Security Investigation Feb 17, 2023 - Redline Stealer is a type of malware that steals sensitive information from infected computers. The malware is known for its ability to bypass antivirus... redline stealerdetection responsesecurity investigationreturnsnew https://www.socinvestigation.com/how-to-detect-malware-hijacking-digital-signatures/ How to Detect Malware Hijacking Digital signatures - Security Investigation Feb 20, 2026 - Hijacking digital signatures is a form of cyber attack where an attacker gains unauthorized access to a digital signature and uses it to sign and distribute... detect malwaredigital signaturessecurity investigationhijacking https://www.ntop.org/security-investigation-for-beginners-using-ntopng/ Security Investigation for Beginners (using ntopng) – ntop security investigationbeginners usingntopng https://www.socinvestigation.com/cve-2023-21554-hunt-for-msmq-queuejumper-in-the-environment/ CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment - Security Investigation Apr 13, 2023 - Check Point Research recently discovered three vulnerabilities in the Microsoft Message Queuing service commonly known as MSMQ. These vulnerabilities were... cve 2023environment securityhuntmsmqinvestigation https://krebsonsecurity.com/page/3/ Krebs on Security – Page 3 – In-depth security news and investigation depth newskrebssecurity3investigation https://optimumsecurity.ca/security-services/investigation-and-risk-management/ Investigation and Risk Management | Optimum Security risk managementinvestigationoptimumsecurity https://www.rferl.org/a/ukraine-cameras-china-security-risks-hikvision-dahua-schemes-investigation/32810571.html Investigation: China's Hikvision, Dahua Security Cameras Heighten Risks Of Russian Attacks On... Testing of Hikvision and Dahua CCTV cameras indicated that certain models are vulnerable to hacking and, in some cases, transmit information to servers... security camerasrussian attacksinvestigationchinahikvision