Welcome to “Test Your SOC” by CyRay

At CyRay, we’re dedicated to streamlining your security processes. Here’s what you can anticipate from our platform:

🔹 Built-in Use Cases: For all CyRay customers using the Mobula platform, these use cases come standard. We ensure a consistent, high-quality experience tailored to your specific needs.

🔹 Agent-less & Native: We champion simplicity. Our use cases function without the necessity for additional agents, leveraging only native logs. Rest assured, third-party agents aren’t part of the equation — unless clearly stated in the article.

🔹 For Testing Purposes Only: Our articles are crafted to offer in-depth insights, but they’re strictly for testing. We adhere to the highest ethical standards, and we encourage you to do the same. Please note: Utilizing our resources for illegal activities is strictly against our terms of use and is prohibited.

Embark on this journey, explore, and let’s fortify your Security Operations Center (SOC) together.
Always remember to test with care and responsibility.

Sign up for our newsletter

Testing Your SOC's Alertness

IntroductionWhile we’re conditioned to scan the periphery for threats, sometimes, the most unexpected activities occur right at the heart of our organizations. Envision this: your CEO, who typically stays miles away from the nitty-gritty of IT, launching PowerShell or tinkering

In the world of cybersecurity, caution is the key to maintaining the integrity of systems and data. Yet, as technology advances, so do the methods used by malicious players. One such tactic is the creation of user accounts that end

In the meticulous arena of cybersecurity, the devil is often in the details. A single character, or even the absence of one, can sometimes be the chink in your armor that adversaries seek. Among such deceptively simple techniques is the

Bridging the Gap or a Potential Pitfall?

Introduction Imagine your trusty Windows Server, typically bound by its Ethernet cables, suddenly embracing the wireless age. Intriguing, isn’t it? While a bold and unconventional move, it offers a novel lens through which modern SOC managers and CISOs can view

Unmasking The Hidden Threats

In the vast expanse of a corporation’s digital assets, the Microsoft SQL server often stands as its crown jewel, safeguarding valuable data crucial to business operations. Strangely though, while companies spend large sums on front-end security, SQL servers are sometimes

Test Guide

Imagine this: An old toy, forgotten and covered with dust, suddenly starts moving on its own after years of inactivity. Creepy, right? This eeriness is not limited to the world of fictional horror movies. In the digital realm, a similar

Test Guide

In the world of cybersecurity, event logs form the cornerstone of threat detection within SIEM (Security Information and Event Management) systems. But how effectively does your Security Operations Center (SOC) identify tampered event logs? This article explores SOC testing within

Test Guide

The aim of this test is to verify that your Security Operations Center (SOC) can effectively detect the “cmdkey /list” command execution. This command is used on Windows systems to list stored credentials and could be exploited by malicious actors

Time to market

One-day SIEM integration