Tales from the SOC

Real-world examples that highlight the power of proactive, real-time response.

Why Tales from the SOC?

Threats don’t always announce themselves explicitly. Sometimes, they come quietly through a phone call you’re not expecting, a subtle change in behavior from one of your colleagues, or a news alert. During these times, CyberMaxx’s “Big R” response kicks in to take real-time action against potential threats

Tales From the SOC On Demand Webinar

Watch the Tales from the SOC live storytelling webinar, which pulls back the curtain on real-time decisions, actions over alerting, and more harrowing tales from our Security Operations Center team. This live 30-minute webinar will dive into stories our team has experienced that highlight the power of proactive, real-time response.

 

eBook

In Part Two of this eBook, we’ve added more true stories straight from our Security Operations Center (SOC)

The stories included:

  • Something’s Amiss in the Honeypot
  • Penetration Test Uncovers Malicious Activity
  • Malicious Inbox Rule and Unauthorized Remote Access Traffic
  • A Phishing Scam for One Account Compromises Many Others
  • An Innocent Research Project Turns into a Cyber Attack

eBook

In this eBook, we’ve compiled a series of true stories straight from our Security Operations Center (SOC)

The stories included:

  • The Call That Protected Four Clients
  • One IP Address, Two Organizations Saved
  • A Malicious Inbox Rule and 300+ Shares
  • From a Physical Threat to Cyber Defense
  • A Thumb Drive and a Criminal Investigation

CISO Perspective Article: Key Takeaways from The Call That Protected Four Clients

It all started with a notification from a large enterprise client, who had received a warning from a third-party healthcare provider they support, telling them that the provider had been completely compromised.

CISO Perspective Article: Key Takeaways from One IP Address, Two Organizations Saved

On the surface, it looked like the alert had been resolved, and the case could be closed. But one analyst’s curiosity led to a deeper investigation, uncovering a hidden threat that could have gone unnoticed.

CISO Perspective Article: Key Takeaways from Malicious Inbox Rule

It started with the CyberMaxx team receiving a peculiar alert for “O365 – Known Malicious Inbox Rule.” But what initially seemed like a minor oddity quickly snowballed into a large-scale incident, triggering a rapid investigation and a major containment effort.

CISO Perspective Article: Key Takeaways from A Physical Threat to Cyber Defense

CyberMaxx analysts know that security risks can quickly cross boundaries from the digital world and into the physical world, so they monitor a wide range of sources. When a physical security issue triggered an investigation, it led to a deeper understanding of a potential cyber threat. It’s proof that no lead is too small to investigate thoroughly.

CISO Perspective Article: Key Takeaways from A Thumb Drive and a Criminal Investigation

As threats become more complex, responding appropriately requires a delicate balance of ethical considerations, human judgment, and legal responsibility. In one case, what looked like a simple device turned out to be a sign of much more nefarious criminal activity.