Learn about the CVE-2023-36884 vulnerability and Unit 42's threat brief. Automate your response with Cortex XSOAR's content packs for rapid mitigation and check out our Phishing automation pack for improved incident response workflow
This Cortex XSOAR Rapid Response content pack helps security teams perform quick actions to address a supply chain attack involving a software-based phone application called 3CXDesktopApp
A Sea of IOCs Enrichment of indicators is one of the first tasks security teams perform during incident response. The challenges here are twofold. Firstly, the process of indicator enrichment is as …
Artificial intelligence (AI) made significant strides between 2014 and 2016. The world was treated to improved language translation apps, self-driving cars, smart home devices, and a slew of other AI-enhanced applications and …
Vulnerability Challenges Vulnerability management is a strategically important process that covers both proactive and reactive aspects of security operations. Since vulnerability management encompasses all computing assets, security teams often grapple unsuccessfully with …
For most employees, the incident is over. The threat has been contained and neutralized, the technical staff has gone home, and management has handled the damage control as best they can. If …