top of page
Search
SOC


SOC: Human, Automation & AI Teaming to Beat Alert Fatigue
You’re stuck in a digital panic room. Every notification is a mini-heart attack. “Is it a hacker? Is it the CEO’s kid downloading a virus? Is it just red teaming guy doing the scanning part… again?” It feels like you’re basically in a pre-school, and all the small kids are throwing digital tantrums together. Most of the time, it’s just digital clutter. Like that one friend who spams the group chat with memes at 3 AM. (Hey! if you are reading this, yes, I am talking about you!
Aastha Thakker
5 min read


A Day in the Life of a SOC Analyst
As promised, here’s a blog for all the SOC peeps out there, be it the freshers finding their feet or the pros juggling complex incidents. SOC life isn’t just about triaging alerts — it’s a mix of tech-savvy detective work, teamwork, and (sometimes) ridiculous client requests. Did I mention the occasional adrenaline rush of stopping a major attack? So, grab a coffee (trust me, you’ll need it), and let’s walk through what a typical day in SOC looks like. Sacred Shift Handover E
Aastha Thakker
4 min read


Detecting Linux Credential Access Attacks with Wazuh
In this blog, we will see the process of how to detect the credential access attacks on Linux endpoints using Wazuh. Credential access attacks target various sensitive information like browser data, password managers, SSH keys, and hashed passwords. To counteract these threats, we utilize Wazuh, a comprehensive security monitoring platform. This guide will walk you through the prerequisites, configurations, and practical steps needed to detect such attacks. Prerequisites: To
Aastha Thakker
7 min read


Wazuh: What, Why, and Wow!
In the last two weeks, we’ve seen what a SOC is and the difference between a Security Operations & Optimization Centre. All these discussions pointed to one key aspect: monitoring and early detection. But how do we monitor effectively? The answer lies in “logs.” Logs are crucial for monitoring and detecting user or device behaviour. Cybercrime is on the rise, putting businesses of all sizes and types at risk. To combat this threat, having a reliable security platform is essen
Aastha Thakker
6 min read


SOC vs SOC
While working in the SOC department, I often feel the urge to express my point of view on the comparison between the human element and security analysis. While time constraints didn’t allow me to write a full-fledged poem, here is a brief piece of my thoughts. I hope it makes sense because it’s deep — trust me! There is a lot between the lines. A missed intrusion, a silent threat, a “true negative,” a bitter regret. A harmless ping, a wasted chase, a “false positive,” leaving
Aastha Thakker
4 min read


Security Operations Center (SOC): Data Guardians
Every day, we hear the news of hacking, data breaches, attacks etc. Making cybersecurity a buzzword along with the constant pressure to secure our data and ourselves from different kind of threats. While, everyone is talking about hacking resources, let’s talk about securing them. Who secures these resources? We? If we, then do we go at every premise and secure their devices and data? That’s practically not possible, right? What is SOC? Here comes the role of SOC. Security Op
Aastha Thakker
6 min read
bottom of page