Why Tales from the SOC?
Threats don’t always announce themselves explicitly. Sometimes, they come quietly through a phone call you’re not expecting, a subtle change in behavior from one of your colleagues, or a news alert. During these times, CyberMaxx’s “Big R” response kicks in to take real-time action against potential threats
Tales From the SOC On Demand Webinar
Watch the Tales from the SOC live storytelling webinar, which pulls back the curtain on real-time decisions, actions over alerting, and more harrowing tales from our Security Operations Center team. This live 30-minute webinar will dive into stories our team has experienced that highlight the power of proactive, real-time response.
eBook
In Part Two of this eBook, we’ve added more true stories straight from our Security Operations Center (SOC)
The stories included:
- Something’s Amiss in the Honeypot
- Penetration Test Uncovers Malicious Activity
- Malicious Inbox Rule and Unauthorized Remote Access Traffic
- A Phishing Scam for One Account Compromises Many Others
- An Innocent Research Project Turns into a Cyber Attack
eBook
In this eBook, we’ve compiled a series of true stories straight from our Security Operations Center (SOC)
The stories included:
- The Call That Protected Four Clients
- One IP Address, Two Organizations Saved
- A Malicious Inbox Rule and 300+ Shares
- From a Physical Threat to Cyber Defense
- A Thumb Drive and a Criminal Investigation
CISO Perspective Article: Key Takeaways from The Call That Protected Four Clients
It all started with a notification from a large enterprise client, who had received a warning from a third-party healthcare provider they support, telling them that the provider had been completely compromised.
CISO Perspective Article: Key Takeaways from One IP Address, Two Organizations Saved
On the surface, it looked like the alert had been resolved, and the case could be closed. But one analyst’s curiosity led to a deeper investigation, uncovering a hidden threat that could have gone unnoticed.
CISO Perspective Article: Key Takeaways from Malicious Inbox Rule
It started with the CyberMaxx team receiving a peculiar alert for “O365 – Known Malicious Inbox Rule.” But what initially seemed like a minor oddity quickly snowballed into a large-scale incident, triggering a rapid investigation and a major containment effort.
CISO Perspective Article: Key Takeaways from A Physical Threat to Cyber Defense
CyberMaxx analysts know that security risks can quickly cross boundaries from the digital world and into the physical world, so they monitor a wide range of sources. When a physical security issue triggered an investigation, it led to a deeper understanding of a potential cyber threat. It’s proof that no lead is too small to investigate thoroughly.
CISO Perspective Article: Key Takeaways from A Thumb Drive and a Criminal Investigation
As threats become more complex, responding appropriately requires a delicate balance of ethical considerations, human judgment, and legal responsibility. In one case, what looked like a simple device turned out to be a sign of much more nefarious criminal activity.