
SOAR
Grid Field – DB Entry Mirroring
Grid Field – DB Entry Mirroring This post is the 2nd part, of a two-part use case on Grid Field in SOAR, written by our SOAR expert Ben Aviv.
SOAR
Grid Field – DB Entry Mirroring
Grid Field – DB Entry Mirroring This post is the 2nd part, of a two-part use case on Grid Field in SOAR, written by our SOAR expert Ben Aviv.

SIEM system
Remote Code Execution Vulnerability CVE-2021-40444
About CVE-2021-40444 Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows.
SIEM system
Remote Code Execution Vulnerability CVE-2021-40444
About CVE-2021-40444 Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows.

SOAR
How to use a Grid Field
How to use a grid field In this post, our SOAR expert, Mr.Ben Aviv, will demonstrate how to use a grid field in XSOAR (Demisto).
SOAR
How to use a Grid Field
How to use a grid field In this post, our SOAR expert, Mr.Ben Aviv, will demonstrate how to use a grid field in XSOAR (Demisto).
Best practices
“It’s good to be the king” – is that so?
September 9, 2021
SIEM system
Advanced Linux threats Monitoring
August 30, 2021
Use cases
2021-34527 (CVE-2021-1675) PrintNightmare – Detection by SIEM Guide
February 7, 2021

Arcsight
CVE-2020-1350 – SigRed – Monitoring By SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
Arcsight
CVE-2020-1350 – SigRed – Monitoring By SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.

Arcsight
CVE-2020-1472 – ZeroLogon – Monitoring by SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
Arcsight
CVE-2020-1472 – ZeroLogon – Monitoring by SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.

Best practices
How to prevent your SIEM from being blind
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
Best practices
How to prevent your SIEM from being blind
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.