#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Incident Response | Breaking Cybersecurity News | The Hacker News

Category — Incident Response
AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters

AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters

Mar 02, 2026 Artificial Intelligence / Threat Detection
The conversation around AI in the SOC has mostly centered on efficiency: closing alerts faster, reducing queue backlog, and automating repetitive work that burns out L1 analysts. That framing is directionally right, and it matters because analyst fatigue is real. For teams dealing with high alert volume, analysts are often asked to make good decisions under a fragmented context and time pressure. But that framing is still incomplete. The bigger shift is not just workflow automation or orchestration of predefined playbooks. It is AI's ability to perform contextual, hypothesis-driven investigation across multiple telemetry sources, work that has traditionally depended on experienced L2 or L3 analysts and limited human time. When that capability can be applied consistently across every alert, it changes the operating model, not just the speed of the existing one. Two recent investigations at Prophet Security make that real. In both cases, the attacks were not obvious from signature-bas...
The Riskiest Alert Types and Why Enterprise SOC Doesn’t Triage Them

The Riskiest Alert Types and Why Enterprise SOC Doesn't Triage Them

Feb 23, 2026
Every few years, a breach happens that security teams study for the wrong reasons. SolarWinds is a good example. When the compromised Orion update started reaching customer environments in early 2020, the signals were already there: unusual DNS requests, unexpected authentication behavior in Azure AD, odd SAML token activity, and lateral movement from on-premises Active Directory into cloud environments.  None of it looked like an attack. Each signal sat at low or medium severity, and they were scattered across domains. The attackers had close to a year of dwell time before FireEye, a victim itself, discovered the breach while investigating a stolen red-team toolkit. We tend to call SolarWinds a one-off. It wasn't.  The real lesson from that breach, and from the ones that have followed it, is structural.  SOCs are designed, staffed, and measured around routine work: phishing, endpoint detections, and user anomalies. The people, processes, dashboards, and tools are ...
OT Security, In Practice: 4 Cross‑Industry Trends from Global Assessments and How CISOs Should Respond

OT Security, In Practice: 4 Cross‑Industry Trends from Global Assessments and How CISOs Should Respond

Jan 26, 2026
OT incidents rarely start with "OT attacks." They start with ordinary enterprise weaknesses: shared credentials, remote access shortcuts, management systems that bridge zones too easily, and monitoring that stops short of operations.  When those weaknesses line up, an initial IT compromise becomes an OT event, and the deciding factor is no longer whether the activity is detected, but whether the environment can be contained and recovered without extended outage. What matters is that these failure patterns repeat across industries, which means they can be anticipated and solved - but only if recovery is treated as a security control, not an afterthought. Recurring OT Security Patterns Across Industries Sygnia is a premier cyber technology and services company, with extensive experience helping organisations' IT/OT environments respond to cyber incidents and strengthen enterprise-wide cyber security..  Across numerous OT security assessments, adversary simulations, and inc...
Smarter Access, Better Protected Data, Faster Audits: Enhancing Your Insider Threat Defense

Smarter Access, Better Protected Data, Faster Audits: Enhancing Your Insider Threat Defense

Nov 24, 2025
Insider threats are rising in both number and cost, forcing security teams to seek stronger cybersecurity solutions. At the same time, IT teams face more frequent audits and more complex data security requirements. Add to this a distributed workforce and third-party contractors, and it's clear why managing privileged access and monitoring user activity is so challenging.  Modern cybersecurity solutions must offer streamlined access management, complete oversight of user activity within your network, and a privacy-first approach to monitoring. This article offers practical tips on enhancing your cybersecurity strategy by addressing these three pillars. We'll also explore how Syteca's new release can help security leaders protect sensitive data, secure access, and improve audit readiness without IT overhead.  Monitoring User Activity while Preserving Their Privacy Keeping a close watch on user actions is critical for insider threat defense, but it raises a dilemma: "...
Implementing AI in the SOC: Lessons Learned from Redis

Implementing AI in the SOC: Lessons Learned from Redis

Nov 02, 2025
AI SOC Agents are going through a hype cycle. If we're going by Gartner's Hype Cycle for Security Operations, 2025 , this technology is still an "Innovation Trigger", but it's at the cusp of "Peak of Inflated Expectations". Every vendor claims their solution will revolutionize security operations. Every conference features another keynote promising autonomous defense. And every CISO is being asked whether AI will replace their security team. At Redis, implementing AI in the SOC has been more of a measured journey. The model is more of a hybrid SOC, so there's a combination of external service providers as well as internal resources. In this case, Prophet Security is currently proving themselves alongside a more traditional MDR provider.  But let's take a step back.  The Tipping Point for AI Adoption within the SOC Considering an AI solution for Redis' SOC came down to the confluence of three drivers.  On an individual level, there was more value from AI tools an...
What Happens to MSSPs and MDRs in the Age of the AI-SOC?

What Happens to MSSPs and MDRs in the Age of the AI-SOC?

Oct 20, 2025
For nearly two decades, managed-security models have defined how most organizations handle detection and response. Faced with alert overload, chronic staffing shortages, and the high cost of 24/7 coverage, many teams turned to Managed Security Service Providers (MSSPs) and later to Managed Detection and Response (MDR) vendors to fill the gap. Beyond staffing and capacity, many also lacked in-house expertise in building detection systems. It was a rational choice. MSSPs and MDRs provided 24/7 monitoring, experienced analysts, and predictable coverage. They gave companies without an in-house SOC a viable way to maintain security coverage in an increasingly complex threat landscape. But the ground has shifted. AI-driven SOC platforms are now automating large parts of what human analysts once did: triaging alerts, correlating signals, enriching incidents, and recommending or even executing responses. That raises a simple but profound question: what happens to the managed-security m...
SOC For All: Why Every Company Can Now Afford One

SOC For All: Why Every Company Can Now Afford One

Sept 15, 2025
For most of its history, the Security Operations Center (SOC) has been a privilege of the few. Building one meant millions in technology spend and round-the-clock analyst coverage. Unsurprisingly, for years, SOCs were a privilege of the few -  large enterprises and organizations with high-risk profiles, where budgets and scale justified the investment. Everyone else was left with partial coverage or had to outsource. That reality is changing. AI has flipped the SOC equation. What was once out of reach for all but the largest enterprises is now accessible and affordable for nearly every company that needs one. The risk every company faces By now, almost any 9-year-old knows that cyberattacks threaten every company . It's no longer just banks and financial giants in the crosshairs. Over the past decade, cyberattacks have expanded into every sector, from e-commerce sites to research institutes to local hospitals. Recent data from the 'VikingCloud 2025 SMB Threat Landscape' repo...
Cybersecurity Resources