Advertisement · 728 × 90
#
Hashtag
#sigmarules
Advertisement · 728 × 90
Post image

Happy Founders Day!🤘🏾

#gomab #phibetasigma #sigmarules #blueandwhite #nograyarea

2 0 0 0
Preview
Sigma Specification 2.0: What You Need to Know Sigma Specification 2.0 adds new metadata fields, modifiers, rule correlations, and filters to help reduce alert fatigue for security teams.

❄️Winter break is the perfect time to brush up on your #Sigmarules! With v2.0 rules you can create vendor-agnostic detections without being limited by proprietary log formats.

Learn about the key changes & supporting Sigma v2.0 mapped to MITRE ATT&CK framework. graylog.org/post/sigma-s... #CyberSec

0 0 0 0
Video

Sigma rule 😎🔥~ Understand the power of consistency.

#motivationalquotes #motivationalshorts #motivational #sigma #billionairelifestyle #sigmarules #sigmamale #lifelessons #valuablelessons #successmotivation #Quotes #ShareInspireQuotes

0 0 0 0
Preview
CVE-2025-31324 Detection: SAP NetWeaver Zero-Day Under Active Exploitation Exposes Critical Systems to Remote Code Execution  | SOC Prime Detect CVE-2025-31324 exploitation, max-severity vulnerability in SAP NetWeaver, using a set of Sigma rules in the SOC Prime Platform.

Detect CVE-2025-31324 exploits — a max-severity zero-day in SAP NetWeaver enabling RCE and full system compromise — with a set of Sigma rules in the SOC Prime Platform.

Sigma Rules: tdm.socprime.com/zeptolink/po...
Details: socprime.com/blog/detect-...

#CVE #CVE202531324 #ZeroDay #SigmaRules

2 0 0 0
Preview
The Ultimate Guide to Sigma Rules Sigma rules are an open-source, platform agnostic format for building high-fidelity detections and engaging in proactive threat hunting so you can mature your security posture and overcome the cyberse...

Leveraging the capabilities of #Sigmarules can help optimize your log management solution for #security detection & response!

Learn about:
❓Why you should use them
📂Specific use cases
🦴Anatomy of a Sigma rule
🔍 Sigma rule event processing for adv. detection capabilities

graylog.org/post/the-ult...

3 1 1 0
Post image

Explore #SigmaRules to detect the exploitation of the most recent, critical, exploitable, and publicly disclosed #vulnerabilities.

Sigma Rules Feed:
https://buff.ly/3PHMkZP

The rules list is dynamically updated daily with detection content on the latest CVEs.

1 0 0 0
Post image

Dive into the #SigmaRules list, based on CERT, CISA, and CSIRT investigations, that helps to address tactics, techniques, and procedures used by various threat actors in ongoing offensive operations.

Rule Feed: https://buff.ly/47b4n1A

1 0 0 0
Post image

Explore #SigmaRules to detect the exploitation of the most recent, critical, exploitable, and publicly disclosed #vulnerabilities.

Sigma Rules Feed: https://tdm.socprime.com/tdm-overview

The rules list is dynamically updated daily with detection content on the latest CVEs.

2 0 0 0
Post image

Explore #SigmaRules list to detect cyber attacks aimed at Active Directory Domain Services (ADDS).

Sigma Rules Feed: tdm.socprime.com/expert/

The rules list is dynamically updated with detection content on the latest attacks.

0 0 0 0
Post image

Compared to release v2023-08-24, in v2024-11-10 there are 469 more public #detectionrules in the #SigmaRules repository.

www.dogesec.com/blog/analysi...

#threatintelligence #threatintel

3 1 1 0
Preview
Illuminate 5.2: Elevating Security Monitoring and Threat Detection Graylog Illuminate 5.2 enhances security monitoring with new Windows Security Sigma Rules and Sendmail Content Packs, offering precise threat detection, improved email security, and streamlined operat...

👀 See what's new in Illuminate 5.2! 😃

Learn about:
✔Windows security #SigmaRules: precision #threatdetection at your fingertips
✔User activity monitoring
✔System-level threat detection
✔Sendmail content pack: elevating email #security

graylog.org/post/graylog... #cybersecurity #infosec

1 1 0 0