FortiWeb — Critical SQL injection vulnerabilityFortinet has patched a critical flaw in its FortiWeb web application firewall that could allow unauthenticated attackers to execute…18h ago18h ago
Wazuh Sysmon Detection Rules Fully Backed with MITRE ATT&CK — Now Available in Our Public RepoAt SOCFortress, we believe security should be accessible, transparent, and effective for organizations of all sizes. That’s why we’re…4d ago4d ago
SOCFortress Integrations — Vulnerability Assessment for network devices (I) — FortiGate FirewallsIntroJul 3Jul 3
🔎 New in Copilot: Scan Suspicious Files with VirusTotal IntegrationIn today’s security landscape, malicious files remain one of the primary attack vectors used by threat actors to infiltrate organizations…Jul 1Jul 1
How to Run Atomic Red Team on Linux and Automate Attack Simulations with VelociraptorAre your Linux detection rules truly working — or just sitting idle?Jun 27Jun 27
SOCFortress × Shuffle: When Open-Source SIEM Meets Open-Source SOARSecurity teams face a constant tug-of-war between speed (how fast can we respond?) and sprawl (how many point products do we need?). At…Jun 26Jun 26
Expanding Your SIEM Stack: How to Ingest Webhook-Only Logs with Shuffle and CoPilotWhen building a robust SIEM stack, one of the most fundamental goals is comprehensive log ingestion. Traditionally, this means pulling logs…Jun 25Jun 25
Validate Your Security Detection RulesSecurity engineering isn’t finished when the rule deploys. It’s finished when you can fire a real-world technique at the endpoint, watch…Jun 13Jun 13