EMAGINED SECURITY’S SOC WELCOMES IT’S NEW SOC MANAGER – BRENNAN EGAN
Resources & Blog
Expand your knowledge by reading from our experts



- 3 min
Incident Response Planning: Preparing for the Unexpected

- 3 min
Vulnerability Assessments: Strengthening Your Security Posture

- 3 min
Threat Detection: Protecting Your Business from Potential Risks

- 7 min
CREDENTIAL-STEALING MALWARE MIGHT BE KNOCKING AT YOUR DOOR


CISA SHIELDS UP - DIRECTIVE

- 4 min
HOW ANY BUSINESS CAN AFFORD MANAGED SOC SERVICES

UNDERSTANDING THE MAGECART ATTACKS


- 4 min
4 KEYS TO CYBER INCIDENT PLANNING AND RESPONSE


- 4 min
3 KEYS TO VULNERABILITY MANAGEMENT

- 4 min
WE BYPASSED YOUR ANTIVIRUS WITH RANSOMWARE... HERE’S HOW

- 5 min
HOW TO PIVOT YOUR SOC TO SUPPORT A REMOTE WORKFORCE

- 5 min
THE ONE MILLION DOLLAR PLUS MANAGED SECURITY SERVICE PROVIDER BLUNDER

- 4 min
TEN WINDOWS 10 TOOLS ATTACKERS KNOW THAT YOU PROBABLY SHOULD

![DECOMPILING MALWARE: INFOSEC DOCKER [2 OF 2]](https://static.wixstatic.com/media/nsplsh_cb0a6a96cd1f428b868c59f5a1639383~mv2.jpg/v1/fill/w_475,h_268,fp_0.50_0.50,q_90,enc_auto/nsplsh_cb0a6a96cd1f428b868c59f5a1639383~mv2.jpg)
DECOMPILING MALWARE: INFOSEC DOCKER [2 OF 2]
![DECOMPILING MALWARE WITHOUT PREVIOUS EXPERIENCE [1 OF 2]](https://static.wixstatic.com/media/5066d8_6ef63251342749439d0c12a355d8be05~mv2.png/v1/fill/w_475,h_268,fp_0.50_0.50,q_95,enc_auto/5066d8_6ef63251342749439d0c12a355d8be05~mv2.png)
DECOMPILING MALWARE WITHOUT PREVIOUS EXPERIENCE [1 OF 2]


SOCIAL MEDIA OSINT FOR SECURITY TEAMS

NINE BOOMS MONERO MINER


FROM RANSOMWARE TO CRYPTO MINING - ACTORS ARE SHAKING THINGS UP