RocketCyber 2021 Updates

RocketCyber SOC Update Summary - July 2021

This RocketCyber SOC Platform Update includes: Bugfixes, Updates, Features and New Apps that are available now.

Read More
RocketCyber Thanksgiving 2020 Updates

RocketCyber SOC Update Summary - Thanksgiving 2020

This RocketCyber SOC Platform Update includes: Bugfixes, Updates, Features and New Apps that are available now.

Read More
RocketCyber Sept 2020 Updates

RocketCyber SOC Platform Update Summary - Sept. 2020

This RocketCyber SOC Platform Update includes: Bugfixes, Updates, Features and New Apps that are available now.

Read More
Business Email Compromise

Business Email Compromise - FBI Remediation Guidance

What is a Business Email Compromise? Remediation guidance from the FBI and 5 suspcious activity examples from the RocketCyber SOC.

Read More
Fileless Malware Kovter

Cyber Cases from the SOC - Fileless Malware 'Kovter'

Real Investigations from the SOC: The Fileless Malware Kovter was observed evading one of the MSP Industry's popular NGAV solutions by....

Read More
What is a Cyber SOC

What is a SOC & 5 Benefits why you need one

A Security Operation Center (SOC) is made up of skilled security personnel, processes and technologies to continuously monitor for malicious activity ...

Read More
RocketCyber Aug 2020 Updates

RocketCyber SOC Platform Update Summary - August 2020

This RocketCyber SOC Platform Update includes: Bugfixes, Updates, Features and New Apps that are available now.

Read More
Squiblydoo Attack

Cyber Cases from the SOC - Squiblydoo Attack

Cyber Cases from the SOC is an executive blog series describing real security incident investigations conducted and reported by the RocketCyber SOC analyst team. Regsvr32 was observed evading cyber prevention.

Read More
Windows Event Log Triage

Triaging Windows Failed Logon Events

Experiencing a high volume of Windows event log 4625 failed login activity? Start here to begin the investigation of uncovering who and why.

Read More
Cyber Defense in Depth

SOC-as-a-Service implementing Defense-in-Depth

Does your MSP's SOC-as-a-Service implement a defense-in-depth strategy, providing a layered security approach across 3 common attack vectors?

Read More
IOA vs IOC

Threat Detection: IOC vs. IOA and usage for SOCs

Learn about combining Indicators of Compromise (IOC) and Indicators of Attack (IOA) for effective MSP and SOC threat monitoring.

Read More
cryptojacking

Cryptocurrency Miner Concerns for SMB Owners

Learn why cryptomining is causing havoc and creating financial/security concerns for small business owners.

Read More
SUBSCRIBE TO ROCKETCYBER BLOG