SOCLabs

102 posts

SOCLabs banner
SOCLabs

SOCLabs

@DetectionLabs

The world's first training platform for detection engineers, supporting multiple SIEM languages and using real logs to hone threat detection skills!

Inscrit le Nisan 2024
396 Abonnements100 Abonnés
Tweet épinglé
SOCLabs
SOCLabs@DetectionLabs·
In terms of detection rule engineering: have you accounted for evasion techniques? I wrote something about this 👇 soc-labs.top/blog/en/how-to…
English
0
0
3
201
SOCLabs
SOCLabs@DetectionLabs·
🚨 New Challenge Live! #140 Threat Detection Engineer Attackers are using the most stealthy techniques to bypass your SIEM… Can you catch it using real logs and multi-language rules (Sigma / SPL / KQL / EQL)? SOCLabs’ latest detection challenge is now live! Real environment + complete attack chain, built for those who want to become top-tier Threat Detection Engineers. 🔥 Test your detection logic right now 👉 soc-labs.top/en/detections/… Master this challenge and truly earn your Detection Engineer title! 🔥 #Cybersecurity #DetectionEngineering #BlueTeam #InfoSec
SOCLabs tweet media
English
0
0
2
120
SOCLabs
SOCLabs@DetectionLabs·
Just open-sourced: Detection Rule Bypass Analyzer (SKILL) 🔥 A specialized AI-powered tool for Detection Engineers and SOC Analysts. It helps you: • Identify blind spots in detection rules for system command execution • Assess bypass risks • Generate realistic bypass test cases • Suggest stronger rule logic to reduce false negatives Stop guessing if your rules can be evaded. Repo: github.com/DetectEng-SOCL… Stars, feedback, and contributions welcome! #DetectionEngineering #SIEM #Splunk #CyberSecurity #BlueTeam
English
0
0
1
83
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
One of our researchers built an AI powered supply chain monitoring tool on a Friday afternoon. The following Monday night it caught the Axios npm compromise before most people knew it existed. Elastic Security Labs is open sourcing the tool. Full story by @dez_ here: go.es.io/4bOfsuq
English
4
18
88
16.7K
SOCLabs
SOCLabs@DetectionLabs·
We've just launched the new macOS Challenges section on SOCLabs! A lot of macOS credential theft attacks rely on simple social engineering. Attackers use osascript to display fake authentication dialogs that look identical to real system prompts. Once the user enters their password, the attacker unlocks the Keychain and dumps saved browser passwords, cookies, and more. If you're practicing detection rules, this Medium difficulty challenge gives you real logs to work with. Give it a try! Link in comments 👇 #DetectionEngineering #macOS #BlueTeam #Infostealer
GIF
English
1
0
0
43
SOCLabs
SOCLabs@DetectionLabs·
This read highlights a practical shift in SecOps: combining LLM-driven natural language queries with deterministic MCP toolchains to automate MITRE coverage checks across fragmented rule formats. detecteng.com/detection-work…
English
0
0
0
39
SOCLabs
SOCLabs@DetectionLabs·
The Self-Improving Agent and TIP: How ThreatClawer Builds Detections and Ships Features While I… by Hatim (threadlinqs-cmd) detecteng.com/the-self-impro…
English
0
0
1
25
SOCLabs retweeté
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
Nearly 65% of orgs are experimenting with AI agents, but fewer than 25% have deployed them in production. 2026 is the year that changes, especially in security operations. Here's what an Agentic AI SOC actually does differently 🧵 ↳ It doesn't just alert you — it correlates signals into full attack chains ↳ It doesn't just detect — it contains, with closed-loop automated response ↳ It doesn't just act — it explains every decision with a traceable reasoning trail The shift: from managing alerts → neutralizing attacks. Copilot = passenger. Agent = driver. Read the full breakdown below.
Elastic Security Labs tweet media
English
4
3
28
2K
SOCLabs retweeté
The Haag™
The Haag™@M_haggis·
Security Detections MCP 3.0 is LIVE What started as a detection search MCP is now an autonomous detection engineering pipeline. Agents now run a full workflow: CTI → coverage analysis → detection generation → SIEM validation → PR staging Pipeline example: • CTI Analyst → extracts MITRE techniques from threat intel • Coverage Analyzer → checks 7k+ detections across Sigma / Splunk / KQL / Elastic • Detection Engineer → generates missing detections • Atomic Executor + SIEM Validator → tests detections • PR Stager → prepares them for review Multi-SIEM support: Splunk • Sentinel • Elastic • Sigma Open source 👇 Repo github.com/MHaggis/Securi… npm npmjs.com/package/securi… Pulse MCP listing pulsemcp.com/servers/mhaggi… Watch the full demo: youtu.be/03ZmD5cdfHI
YouTube video
YouTube
English
5
84
442
27.3K
SOCLabs
SOCLabs@DetectionLabs·
@SpecterSignal Every alert tells a story. Even the ones that look like noise.
English
0
0
1
14
SOCLabs
SOCLabs@DetectionLabs·
NEW CHALLENGE: Chrysalis Backdoor Detection! 🚨 Rapid7 just unveiled a sophisticated Chrysalis Backdoor, leveraging Notepad++ supply chain, custom obfuscation (Warbird!), and advanced DLL sideloading. Reading about it is one thing. Detecting it is another. We've recreated the attack in a real-world environment and built a hands-on lab to test your SIEM rules against this APT. Can you craft the logic to unmask this stealthy threat? 👉 Challenge #136 is LIVE. Prove your skills: soc-labs.top/en/detections/… #DetectionEngineering #ThreatHunting #MalwareAnalysis #APT #ChrysalisBackdoor #BlueTeam #SIEM
English
0
0
2
89
SOCLabs
SOCLabs@DetectionLabs·
Huge thanks to @Rapid7 for this critical deep dive into the #ChrysalisBackdoor 👏Their research is invaluable. For those ready to move from reading to real-world detection practice, we've built a hands-on challenge based on these exact techniques.👉 Test your SIEM rules against this APT: soc-labs.top/en/detections/… #DetectionEngineering #ThreatIntelligence #BlueTeam #CyberSecurity"
Rapid7@rapid7

🔎 Rapid7 Labs, alongside our MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group #LotusBlossom. Find a deep technical analysis of the custom backdoor 'Chrysalis', Notepad++, Warbird, and more in our latest blog: r-7.co/4kaerPA

English
0
0
0
60
SOCLabs
SOCLabs@DetectionLabs·
Outstanding technical breakdown by the MDR team! 👏 We were so inspired by the depth of the Chrysalis analysis that we've already built a hands-on detection challenge for it on SOCLabs. For anyone wanting to practice writing rules for this specific Lotus Blossom toolkit, check it out here: soc-labs.top/en/detections/…
English
0
0
0
311
Rapid7
Rapid7@rapid7·
🔎 Rapid7 Labs, alongside our MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group #LotusBlossom. Find a deep technical analysis of the custom backdoor 'Chrysalis', Notepad++, Warbird, and more in our latest blog: r-7.co/4kaerPA
Rapid7 tweet mediaRapid7 tweet media
English
6
94
309
23K