Soc Prime

Soc Prime company information, Employees & Contact Information

Explore related pages

Related company profiles:

SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community. Powered by Sigma language and MITRE ATT&CK® as core pillars, SOC Prime drives a transformational change in cybersecurity to empower smart data orchestration, dynamic attack surface visibility, and cost-efficient threat hunting. Our innovation, backed by zero-trust & multi-cloud approach, is recognized by independent research companies, credited by leading SIEM, XDR & MDR vendors, and trusted by 11,000+ organizations, including 42% of Fortune 100 and 21% of Forbes Global 2000.
Looking for a particular Soc Prime employee's phone or email?

Soc Prime Questions

News

TerraStealerV2 and TerraLogger Detection: Golden Chickens Threat Actor Behind New Malware Families - SOC Prime

TerraStealerV2 and TerraLogger Detection: Golden Chickens Threat Actor Behind New Malware Families SOC Prime

Detect SimpleHelp RMM Vulnerability Exploitation: CISA Warns of Threat Actors Abusing Unpatched Flaws for Persistent Access and Ransomware Deployment - SOC Prime

Detect SimpleHelp RMM Vulnerability Exploitation: CISA Warns of Threat Actors Abusing Unpatched Flaws for Persistent Access and Ransomware Deployment SOC Prime

CVE-2025-55177: Vulnerability in WhatsApp iOS & macOS Messaging Clients Exploited for Zero-Click Attacks - SOC Prime

CVE-2025-55177: Vulnerability in WhatsApp iOS & macOS Messaging Clients Exploited for Zero-Click Attacks SOC Prime

CVE-2025-32711 Vulnerability: “EchoLeak” Flaw in Microsoft 365 Copilot Could Enable a Zero-Click Attack on an AI Agent - SOC Prime

CVE-2025-32711 Vulnerability: “EchoLeak” Flaw in Microsoft 365 Copilot Could Enable a Zero-Click Attack on an AI Agent SOC Prime

CVE-2025-31324 Detection: SAP NetWeaver Zero-Day Under Active Exploitation Exposes Critical Systems to Remote Code Execution - SOC Prime

CVE-2025-31324 Detection: SAP NetWeaver Zero-Day Under Active Exploitation Exposes Critical Systems to Remote Code Execution SOC Prime

CVE-2025-47981: Critical Heap-Based Buffer Overflow Vulnerability in Windows SPNEGO Extended Negotiation Leads to RCE - SOC Prime

CVE-2025-47981: Critical Heap-Based Buffer Overflow Vulnerability in Windows SPNEGO Extended Negotiation Leads to RCE SOC Prime

Lazarus Group Attack Detection: Hackers Expand Their Toolkit with PondRAT, ThemeForestRAT, and RemotePE Malware Strains - SOC Prime

Lazarus Group Attack Detection: Hackers Expand Their Toolkit with PondRAT, ThemeForestRAT, and RemotePE Malware Strains SOC Prime

What Is Generative AI (GenAI)? - SOC Prime

What Is Generative AI (GenAI)? SOC Prime

Detect CVE-2025-31324 Exploitation by Chinese APT Groups Targeting Critical Infrastructure - SOC Prime

Detect CVE-2025-31324 Exploitation by Chinese APT Groups Targeting Critical Infrastructure SOC Prime

CVE-2025-33053 Detection: A Critical WebDAV Zero-Day RCE Vulnerability Actively Weaponized by Stealth Falcon APT Group - SOC Prime

CVE-2025-33053 Detection: A Critical WebDAV Zero-Day RCE Vulnerability Actively Weaponized by Stealth Falcon APT Group SOC Prime

CVE-2025-5777 Detection: A New Critical Vulnerability Dubbed “CitrixBleed 2” in NetScaler ADC Faces Exploitation Risk - SOC Prime

CVE-2025-5777 Detection: A New Critical Vulnerability Dubbed “CitrixBleed 2” in NetScaler ADC Faces Exploitation Risk SOC Prime

Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique - SOC Prime

Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique SOC Prime

CVE-2025-34028 Detection: A Maximum-Severity Vulnerability in the Commvault Command Center Enables RCE - SOC Prime

CVE-2025-34028 Detection: A Maximum-Severity Vulnerability in the Commvault Command Center Enables RCE SOC Prime

Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix - SOC Prime

Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix SOC Prime

Secret Blizzard Attack Detection: russia-Backed APT Targets Foreign Embassies in Moscow With ApolloShadow Malware - SOC Prime

Secret Blizzard Attack Detection: russia-Backed APT Targets Foreign Embassies in Moscow With ApolloShadow Malware SOC Prime

Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools - SOC Prime

Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools SOC Prime

CVE-2025-53770 Detection: Microsoft SharePoint Zero-Day Vulnerability Is Actively Exploited for RCE Attacks - SOC Prime

CVE-2025-53770 Detection: Microsoft SharePoint Zero-Day Vulnerability Is Actively Exploited for RCE Attacks SOC Prime

Detecting Covert curl Usage with Uncoder AI’s Decision Tree in Carbon Black - SOC Prime

Detecting Covert curl Usage with Uncoder AI’s Decision Tree in Carbon Black SOC Prime

Interlock Ransomware Detection: The FBI, CISA, and Partners Issue Joint Alert on Massive Attacks via the ClickFix Social Engineering Technique - SOC Prime

Interlock Ransomware Detection: The FBI, CISA, and Partners Issue Joint Alert on Massive Attacks via the ClickFix Social Engineering Technique SOC Prime

CVE-2025-20286 Vulnerability Exploitation: Critical Cisco ISE Flaw Affects AWS, Microsoft Azure, and OCI Cloud Deployments - SOC Prime

CVE-2025-20286 Vulnerability Exploitation: Critical Cisco ISE Flaw Affects AWS, Microsoft Azure, and OCI Cloud Deployments SOC Prime

CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover - SOC Prime

CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover SOC Prime

CVE-2025-9074: Critical Vulnerability in Docker Desktop Enables Local Container Access to Docker Engine API via Subnet - SOC Prime

CVE-2025-9074: Critical Vulnerability in Docker Desktop Enables Local Container Access to Docker Engine API via Subnet SOC Prime

CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise - SOC Prime

CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise SOC Prime

Billbug Attack Detection: China-Linked Espionage Actors Target Southeast Asian Organizations - SOC Prime

Billbug Attack Detection: China-Linked Espionage Actors Target Southeast Asian Organizations SOC Prime

CVE-2025-33073: Windows SMB Client Zero-Day Lets Attackers Gain SYSTEM Privileges - SOC Prime

CVE-2025-33073: Windows SMB Client Zero-Day Lets Attackers Gain SYSTEM Privileges SOC Prime

BERT Ransomware Group Activity Detection: Attacks Across Asia, Europe, and the U.S. Targeting Windows and Linux Platforms - SOC Prime

BERT Ransomware Group Activity Detection: Attacks Across Asia, Europe, and the U.S. Targeting Windows and Linux Platforms SOC Prime

CVE-2025-20352 Vulnerability: A Critical Zero-Day in Cisco IOS and IOS XE Software Under Active Exploitation - SOC Prime

CVE-2025-20352 Vulnerability: A Critical Zero-Day in Cisco IOS and IOS XE Software Under Active Exploitation SOC Prime

Koske Malware Detection: New AI-Generated Linux Threat in the Wild - SOC Prime

Koske Malware Detection: New AI-Generated Linux Threat in the Wild SOC Prime

CVE-2025-10585 Vulnerability: A New Zero-Day Exploit in Chrome’s V8 JavaScript and WebAssembly Engine Weaponized in Real-World Attacks - SOC Prime

CVE-2025-10585 Vulnerability: A New Zero-Day Exploit in Chrome’s V8 JavaScript and WebAssembly Engine Weaponized in Real-World Attacks SOC Prime

RedCurl/EarthKapre APT Attack Detection: A Sophisticated Cyber-Espionage Group Uses a Legitimate Adobe Executable to Deploy a Loader - SOC Prime

RedCurl/EarthKapre APT Attack Detection: A Sophisticated Cyber-Espionage Group Uses a Legitimate Adobe Executable to Deploy a Loader SOC Prime

Crypto24 Ransomware Detection: Hackers Hit Large Organizations via Legitimate Tools and Custom Malware to Stay Under the Radar - SOC Prime

Crypto24 Ransomware Detection: Hackers Hit Large Organizations via Legitimate Tools and Custom Malware to Stay Under the Radar SOC Prime

CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions - SOC Prime

CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions SOC Prime

Gunra Ransomware Detection: New Threat Targets Various Industries Globally Using Double-Extortion Tactics and Advanced Malicious Behaviors - SOC Prime

Gunra Ransomware Detection: New Threat Targets Various Industries Globally Using Double-Extortion Tactics and Advanced Malicious Behaviors SOC Prime

CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution - SOC Prime

CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution SOC Prime

CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution - SOC Prime

CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution SOC Prime

UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL - SOC Prime

UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL SOC Prime

BadSuccessor Detection: Critical Windows Server Vulnerability Can Compromise Any User in Active Directory - SOC Prime

BadSuccessor Detection: Critical Windows Server Vulnerability Can Compromise Any User in Active Directory SOC Prime

CVE-2025-32463 and CVE-2025-32462 Detection: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments - SOC Prime

CVE-2025-32463 and CVE-2025-32462 Detection: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments SOC Prime

AI-Powered ATT&CK Tag Prediction for Sigma Rules by Uncoder AI - SOC Prime

AI-Powered ATT&CK Tag Prediction for Sigma Rules by Uncoder AI SOC Prime

UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex - SOC Prime

UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex SOC Prime

CVE-2025-24201 Exploitation: Apple Fixes the WebKit Zero-Day Vulnerability Used in Sophisticated Attacks - SOC Prime

CVE-2025-24201 Exploitation: Apple Fixes the WebKit Zero-Day Vulnerability Used in Sophisticated Attacks SOC Prime

EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East - SOC Prime

EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East SOC Prime

Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain - SOC Prime

Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain SOC Prime

CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices - SOC Prime

CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices SOC Prime

CVE-2025-32432: Critical Craft CMS Vulnerability Is Actively Exploited in Zero-Day Attacks, Leads to Remote Code Execution - SOC Prime

CVE-2025-32432: Critical Craft CMS Vulnerability Is Actively Exploited in Zero-Day Attacks, Leads to Remote Code Execution SOC Prime

CVE-2025-1974: Critical Set of Vulnerabilities in Ingress NGINX Controller for Kubernetes Leading to Unauthenticated RCE - SOC Prime

CVE-2025-1974: Critical Set of Vulnerabilities in Ingress NGINX Controller for Kubernetes Leading to Unauthenticated RCE SOC Prime

Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks - SOC Prime

Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks SOC Prime

DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution - SOC Prime

DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution SOC Prime

CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers - SOC Prime

CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers SOC Prime

BlueAlpha Attack Detection: russia-affiliated Hacking Collective Abuses Cloudflare Tunnels to Distribute GammaDrop Malware - SOC Prime

BlueAlpha Attack Detection: russia-affiliated Hacking Collective Abuses Cloudflare Tunnels to Distribute GammaDrop Malware SOC Prime

New Cyber-Espionage Campaign Detection: Suspected China-Backed Actors Target High-Profile Organizations in Southeast Asia - SOC Prime

New Cyber-Espionage Campaign Detection: Suspected China-Backed Actors Target High-Profile Organizations in Southeast Asia SOC Prime

UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware - SOC Prime

UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware SOC Prime

UAC-0057 Attack Detection: A Surge in Adversary Activity Distributing PICASSOLOADER and Cobalt Strike Beacon - SOC Prime

UAC-0057 Attack Detection: A Surge in Adversary Activity Distributing PICASSOLOADER and Cobalt Strike Beacon SOC Prime

What Are SIGMA Rules: Beginner’s Guide - SOC Prime

What Are SIGMA Rules: Beginner’s Guide SOC Prime

Continuous Content Management Powered by SOC Prime - SOC Prime

Continuous Content Management Powered by SOC Prime SOC Prime

UAC-0050 Phishing Attack Detection: The russia-Backed Group Massively Spreads Tax-Related Phishing Emails and Exploit LITEMANAGER - SOC Prime

UAC-0050 Phishing Attack Detection: The russia-Backed Group Massively Spreads Tax-Related Phishing Emails and Exploit LITEMANAGER SOC Prime

SOC Prime Introduces The Prime Hunt - SOC Prime

SOC Prime Introduces The Prime Hunt SOC Prime

Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine - SOC Prime

Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine SOC Prime

UAC-0063 Attack Detection: Hackers Target Ukrainian Research Institutions Using HATVIBE, CHERRYSPY, and CVE-2024-23692 - SOC Prime

UAC-0063 Attack Detection: Hackers Target Ukrainian Research Institutions Using HATVIBE, CHERRYSPY, and CVE-2024-23692 SOC Prime

Black Basta Ransomware Attack Detection: Recent Malicious Campaigns Using New Custom Tools Attributed to the FIN7 Group - SOC Prime

Black Basta Ransomware Attack Detection: Recent Malicious Campaigns Using New Custom Tools Attributed to the FIN7 Group SOC Prime

SOC Prime Strengthens its Executive Team with a Group of Renowned Industry Experts - SOC Prime

SOC Prime Strengthens its Executive Team with a Group of Renowned Industry Experts SOC Prime

What Is MITRE ATT&CK® and How to Use It for Self-Advancement? - SOC Prime

What Is MITRE ATT&CK® and How to Use It for Self-Advancement? SOC Prime

Rule of the Week: Turla Group - SOC Prime

Rule of the Week: Turla Group SOC Prime

SOC Prime Integrates with Amazon Security Lake to Supercharge Security Operations - SOC Prime

SOC Prime Integrates with Amazon Security Lake to Supercharge Security Operations SOC Prime

SOC Prime Provides a Smoking Guns Sigma Rules List to Give Organizations a Competitive Advantage in Cyber War - SOC Prime

SOC Prime Provides a Smoking Guns Sigma Rules List to Give Organizations a Competitive Advantage in Cyber War SOC Prime

SOC Prime Introduces the Onboarding Wizard for its Detection as Code Platform - SOC Prime

SOC Prime Introduces the Onboarding Wizard for its Detection as Code Platform SOC Prime

SOC Prime Unlocks Free Access to Uncoder CTI - SOC Prime

SOC Prime Unlocks Free Access to Uncoder CTI SOC Prime

Lazarus Group Attacks Manufacturing and Electrical Industries in Europe - SOC Prime

Lazarus Group Attacks Manufacturing and Electrical Industries in Europe SOC Prime

SnipBot Detection: A New RomCom Malware Variant Leverages a Custom Code Obfuscation Method and Sophisticated Evasion Techniques - SOC Prime

SnipBot Detection: A New RomCom Malware Variant Leverages a Custom Code Obfuscation Method and Sophisticated Evasion Techniques SOC Prime

Rule Digest: Detection Content by SOC Prime Team - SOC Prime

Rule Digest: Detection Content by SOC Prime Team SOC Prime

Quantum Ransomware Attack Detection: Malware Deployed at Lightning Speed - SOC Prime

Quantum Ransomware Attack Detection: Malware Deployed at Lightning Speed SOC Prime

Gamaredon Attack Detection: Cyber-Espionage Operations Against Ukraine by the russia-linked APT - SOC Prime

Gamaredon Attack Detection: Cyber-Espionage Operations Against Ukraine by the russia-linked APT SOC Prime

Interview with Developer: Osman Demir - SOC Prime

Interview with Developer: Osman Demir SOC Prime

Russia-Linked APT28 (UAC-0028) Threat Actors Spread CredoMap_v2 Malware in a Phishing Attack on Ukraine - SOC Prime

Russia-Linked APT28 (UAC-0028) Threat Actors Spread CredoMap_v2 Malware in a Phishing Attack on Ukraine SOC Prime

UAC-0050 Activity Detection: Hackers Impersonate SSSCIP and State Emergency Service of Ukraine Using Remote Utilities - SOC Prime

UAC-0050 Activity Detection: Hackers Impersonate SSSCIP and State Emergency Service of Ukraine Using Remote Utilities SOC Prime

UAC-0102 Phishing Attack Detection: Hackers Steal Authentication Data Impersonating the UKR.NET Web Service - SOC Prime

UAC-0102 Phishing Attack Detection: Hackers Steal Authentication Data Impersonating the UKR.NET Web Service SOC Prime

OriginLogger Malware Detection: Researchers Shed Light on AgentTesla’s Successor - SOC Prime

OriginLogger Malware Detection: Researchers Shed Light on AgentTesla’s Successor SOC Prime

Detection Content: Drovorub Malware - SOC Prime

Detection Content: Drovorub Malware SOC Prime

Interview with Developer: Ariel Millahuel - SOC Prime

Interview with Developer: Ariel Millahuel SOC Prime

SOC Prime Introduces Digital Badge Recognition for Threat Bounty Content Authors - SOC Prime

SOC Prime Introduces Digital Badge Recognition for Threat Bounty Content Authors SOC Prime

Enable Continuous Content Management with the SOC Prime Platform - SOC Prime

Enable Continuous Content Management with the SOC Prime Platform SOC Prime

Detecting Grafana Zero-Day Vulnerability (CVE-2021-43798) - SOC Prime

Detecting Grafana Zero-Day Vulnerability (CVE-2021-43798) SOC Prime

Interview with Developer: Thomas Patzke - SOC Prime

Interview with Developer: Thomas Patzke SOC Prime

Detection Content: MATA Multi-platform malware framework by Lazarus APT - SOC Prime

Detection Content: MATA Multi-platform malware framework by Lazarus APT SOC Prime

SOC Prime Threat Detection Marketplace – Getting Ready to Explore - SOC Prime

SOC Prime Threat Detection Marketplace – Getting Ready to Explore SOC Prime

Interview with Developer: Sittikorn Sangrattanapitak - SOC Prime

Interview with Developer: Sittikorn Sangrattanapitak SOC Prime

Jester Stealer Malware Detection: Phishing Attacks Spreading Info-Stealing Malware by the UAC-0104 Hacking Group - SOC Prime

Jester Stealer Malware Detection: Phishing Attacks Spreading Info-Stealing Malware by the UAC-0104 Hacking Group SOC Prime

Detect PlugX Trojan Masquerading as a Legitimate Windows Debugger Tool to Fly Under the Radar - SOC Prime

Detect PlugX Trojan Masquerading as a Legitimate Windows Debugger Tool to Fly Under the Radar SOC Prime

Threat Actors Leverage Spear-Phishing E-Mails Mimicking UKR.NET Service for Espionage - SOC Prime

Threat Actors Leverage Spear-Phishing E-Mails Mimicking UKR.NET Service for Espionage SOC Prime

FONIX Ransomware as a Service Detection - SOC Prime

FONIX Ransomware as a Service Detection SOC Prime

Interview with Developer: Emir Erdogan - SOC Prime

Interview with Developer: Emir Erdogan SOC Prime

Clop Ransomware Can Terminate Hundreds of Windows Processes - SOC Prime

Clop Ransomware Can Terminate Hundreds of Windows Processes SOC Prime

UAC-0184 Attack Detection: Targeted Phishing Attacks Against the Armed Forces of Ukraine Using Remcos RAT and Reverse SSH - SOC Prime

UAC-0184 Attack Detection: Targeted Phishing Attacks Against the Armed Forces of Ukraine Using Remcos RAT and Reverse SSH SOC Prime

Interview with Developer: Nate Guagenti - SOC Prime

Interview with Developer: Nate Guagenti SOC Prime

Threat Detection Marketplace 4.12.0 Is Released - SOC Prime

Threat Detection Marketplace 4.12.0 Is Released SOC Prime

CVE-2023-24055 Detection: Notorious Vulnerability in KeePass Potentially Exposing Cleartext Passwords - SOC Prime

CVE-2023-24055 Detection: Notorious Vulnerability in KeePass Potentially Exposing Cleartext Passwords SOC Prime

Cobalt Strike Beacon, GrimPlant, and GraphSteel Malware Massively Spread by UAC-0056 Threat Actors in Targeted Phishing Emails: CERT-UA Alert - SOC Prime

Cobalt Strike Beacon, GrimPlant, and GraphSteel Malware Massively Spread by UAC-0056 Threat Actors in Targeted Phishing Emails: CERT-UA Alert SOC Prime

SOC Prime Platform Now Supports the MITRE ATT&CK® Framework v12 - SOC Prime

SOC Prime Platform Now Supports the MITRE ATT&CK® Framework v12 SOC Prime

What is Quantum Ransomware? - SOC Prime

What is Quantum Ransomware? SOC Prime

APT28 Adversary Activity Detection: New Phishing Attacks Targeting Ukrainian and Polish Organizations - SOC Prime

APT28 Adversary Activity Detection: New Phishing Attacks Targeting Ukrainian and Polish Organizations SOC Prime

Top Soc Prime Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant