Latest Blogs About "SOC Threat Intel"

10 total posts.

< 1 Min Read
Creating Compliance Framework Templates with Threat Stack

John Pinkham

June 22, 2022

As customer data protection expectations and regulatory compliance mandates in cybersecurity become more and more focused, organizations seek ways to ...

2 Min Read
High-precision threat detection for the Log4j vulnerability

John Pinkham

December 21, 2021

The recent disclosure of the Log4shell exploit has impacted the operations of many organizations over the past few weeks.  It has also been a ...

2 Min Read
Threat Stack SOC Report, Q1 2020: Security Teams Adjust to Remote Work

Jackson Connell

April 9, 2020

This morning the Threat Stack Security Operations Center (SOC) released its Q1 report of key findings and trends among Threat Stack customers. This ...

4 Min Read
Enabling EMR Self-Service With ChatOps

Pat Cable

February 27, 2020

The Threat Stack Security Operations Center loves data. And Threat Stack has a lot of data! Our SOC analysts leverage Amazon Elastic MapReduce and ...

7 Min Read
Exporting Data From Threat Stack for Custom Analytics

Blaine Connaughton

February 25, 2020

Has this host been compromised? Did this host always do this? Everyone who has worked in operations/engineering/security has at some time had a ...

2 Min Read
Threat Stack SOC Analysis: Investigating Incidents Involving Automation Tools

Mike Broberg

February 20, 2020

As part of their 24/7 work supporting customers through the Cloud SecOps Program℠, the security analysts in the Threat Stack Security Operations ...

3 Min Read
Findings From the Threat Stack Q3, 2019 SOC Report

Blaine Connaughton

October 8, 2019

Going ahead, the Threat Stack Security Operations Center (SOC) will be publishing a quarterly report summarizing lessons we’ve learned, trends ...

2 Min Read
A Threat Stack SOC Analysis: The Continuing Evolution of the Shellbot Cryptomining Malware

Ethan Hansen

May 15, 2019

Update: Threat Stack Presents Threat Briefing On New Cryptomining Shellbot Malware Variant Available: On demand About This Threat ...

2 Min Read
Go Behind the Scenes of a Docker Cryptojacking Attack

Robin Stone

April 10, 2019

When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was ...

6 Min Read
Detecting Unsafe Data Deserialization With Threat Stack

Aakash Prasad

December 6, 2018

UPDATED — January 22, 2019 The Threat Stack SOC is aware of the recent disclosure of a breach of the PHP Extension and Application Repository ...