❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 24 January 2026Main stream

Extended Detection and Response (XDR): A New Era in Cybersecurity

23 January 2026 at 16:14

The digital landscape is evolving at a rapid pace, and so are the threats that target organizations. With cyberattacks becoming more sophisticated and diverse, traditional security solutions often struggle to keep up. Businesses today need a more unified, proactive, and intelligent approach to detect and respond to threats. This is where Extended Detection and Response

The post Extended Detection and Response (XDR): A New Era in Cybersecurity appeared first on Seceon Inc.

The post Extended Detection and Response (XDR): A New Era in Cybersecurity appeared first on Security Boulevard.

Before yesterdayMain stream

Real-time Threat Intelligence: Empowering Proactive Cybersecurity with Seceon

23 January 2026 at 08:04

As businesses continue their digital transformation journeys, they are exposed to an ever-expanding attack surface. With the proliferation of cloud environments, remote work, and the increasing use of IoT devices, the complexity of cybersecurity threats has intensified. In this fast-evolving landscape, traditional security toolsβ€”based on signatures and static rule-based methodsβ€”are no longer sufficient. Organizations need

The post Real-time Threat Intelligence: Empowering Proactive Cybersecurity with Seceon appeared first on Seceon Inc.

The post Real-time Threat Intelligence: Empowering Proactive Cybersecurity with Seceon appeared first on Security Boulevard.

Real-time Threat Intelligence: Empowering Proactive Cybersecurity with Seceon

19 January 2026 at 09:05

As businesses continue their digital transformation journeys, they are exposed to an ever-expanding attack surface. With the proliferation of cloud environments, remote work, and the increasing use of IoT devices, the complexity of cybersecurity threats has intensified. In this fast-evolving landscape, traditional security toolsβ€”based on signatures and static rule-based methodsβ€”are no longer sufficient. Organizations need

The post Real-time Threat Intelligence: Empowering Proactive Cybersecurity with Seceon appeared first on Seceon Inc.

The post Real-time Threat Intelligence: Empowering Proactive Cybersecurity with Seceon appeared first on Security Boulevard.

Have You Seen My Domain Controller?

12 December 2025 at 11:09
Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .

Splunk in Action: From SPL to PCAP

12 December 2025 at 08:57
Learn how Cisco Live SOC uses Splunk SPL and Endace PCAP to investigate exposed HTTP authentication and Kerberos activity, securing sensitive data on public Wi-Fi networks.

In Splunk, Empty Fields May Not Be Null

12 December 2025 at 08:00
Splunk's coalesce function treats empty fields as non-null. Learn to use Splunk macros to convert empty strings to nulls for accurate data selection and reliable detections.
❌
❌