The Threat Bounty Program experienced significant growth in September, with more submissions of detection rules for verification and successful releases of the rules to the SOC Prime Platform.
Only rules that pass the verification process can be published, and the challenge of meeting the requirements enhances the professional advancement of Program members.
The top September rules by Threat Bounty authors include detection of RAT execution, Hadooken malware execution, suspicious Microsoft IIS configuration, detection of signed binary proxy execution, and suspicious SChannel weak certificate mapping methods.
The top five Threat Bounty authors for September are Sittikorn Sangrattanapitak, Nattatorn Chuensangarun, Davut Selcuk, Emir Erdogan, and Osman Demir.