ashe251.bsky.social
@ashe251.bsky.social
Reposted
Oracle has released an emergency update to address a critical RCE vulnerability (CVE-2025-61882) in its E-Business Suite, which has been actively exploited in recent Cl0p ransomware data theft attacks.
socprime.com/blog/cve-202...
#cybersecurity #infosec
CVE-2025-61882 Vulnerability Detection: A Critical Oracle E-Business Suite Zero-Day Exploited in Cl0p Data Theft Attacks | SOC Prime
Detect CVE-2025-61882 exploitation attempts, a critical zero-day vulnerability in Oracle EBS, using Sigma rules in the SOC Prime Platform.
socprime.com
October 8, 2025 at 11:34 AM
Reposted
Attackers actively exploit critical WinRAR zero-day (CVE-2025-8088) in the wild for targeted phishing campaigns that spread RomCom malware. Detect exploitation attempts at the earliest stages using Sigma rules in the SOC Prime Platform.
buff.ly/368dzvT
#cybersecurity #detectionengeenering
August 11, 2025 at 3:26 PM
Reposted
Detect UAC-0099 attacks against Ukraine using MATCHBOIL, MATCHWOK, and DRAGSTARE malware with curated Sigma rules from SOC Prime Platform.
socprime.com/blog/detect-...
UAC-0099 Attack Detection: Hackers Target Government and Defense Agencies in Ukraine Using MATCHBOIL, MATCHWOK, and DRAGSTARE Malware | SOC Prime
Detect UAC-0099 attacks against Ukraine using MATCHBOIL, MATCHWOK, and DRAGSTARE malware with curated Sigma rules from SOC Prime Platform.
socprime.com
August 7, 2025 at 11:45 AM
Reposted
Secret Blizzard APT group (aka Turla) leverages ApolloShadow malware to spy on diplomatic entities in a long-lasting AiTM campaign at the ISP level. Detect associated malicious activity with Sigma rules in the SOC Prime Platform.
socprime.com/blog/apollos...
Secret Blizzard Attack Detection: russia-Backed APT Targets Foreign Embassies in Moscow With ApolloShadow Malware | SOC Prime
Detect Secret Blizzard activity using ApolloShadow malware to spy on foreign embassies with a set of Sigma rules in the SOC Prime Platform.
socprime.com
August 6, 2025 at 9:18 AM
Reposted
The russia-backed #Gamaredon group targets Ukraine once again in the ongoing campaign that employs DLL sideloading and exploits LNK files to spread #Remcos backdoor. Detect related #APT attacks with #Sigma rules from SOC Prime Platform.
buff.ly/5LLvmrp
Gamaredon Campaign Detection: russia-backed APT Group Targets Ukraine Using LNK Files to Spread Remcos Backdoor - SOC Prime
Detect Gamaredon APT attacks against Ukraine using malicious LNK files to spread Remcos backdoor with Sigma rules from SOC Prime Platform.
buff.ly
April 2, 2025 at 12:16 PM