menu
techminis

A naukri.com initiative

google-web-stories
source image

Socprime

1M

read

377

img
dot

Image Credit: Socprime

SOC Prime Threat Bounty Digest — September 2024 Results

  • The Threat Bounty Program experienced significant growth in September, with more submissions of detection rules for verification and successful releases of the rules to the SOC Prime Platform.
  • Only rules that pass the verification process can be published, and the challenge of meeting the requirements enhances the professional advancement of Program members.
  • The top September rules by Threat Bounty authors include detection of RAT execution, Hadooken malware execution, suspicious Microsoft IIS configuration, detection of signed binary proxy execution, and suspicious SChannel weak certificate mapping methods.
  • The top five Threat Bounty authors for September are Sittikorn Sangrattanapitak, Nattatorn Chuensangarun, Davut Selcuk, Emir Erdogan, and Osman Demir.

Read Full Article

like

22 Likes

For uninterrupted reading, download the app