Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is a SOC in cyber security? Definition & Meaning

You may have heard people talking about SOC recently, especially now with the increase in the use of digital assets and remote applications. In these cases, SOC enables organisations to bolster their security posture and be more proactive in detecting and preventing threats. But what is SOC in cyber security?

Apache Superset - Database Data Retrieval Through Improper Error Handling

Anastasios Stasinopoulos from OBRELA LABS Team discovered a security flaw that affects Apache Superset (before 3.0.4, from 3.1.0 before 3.1.1), an open-source modern data exploration and visualization platform. Apache Superset error handling can be manipulated in order to allow data retrieval from the backend database.

Obrela Achieves NCSC CIR Level 2 Assure Service Provider Status , Demonstrating Commitment to Cybersecurity Excellence

Obrela proudly announces it has been awarded the National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 Assured Service Provider status issued by CREST. This underscores Obrela's unwavering dedication to maintaining the highest standards of cybersecurity readiness and incident response capabilities.

Cloud Monitoring: Critical for Business Success

Cloud Monitoring is a crucial part of the security stack for many modern enterprises. More businesses have continued to shift their services and operational activity into the cloud in the form of Software (SaaS), Platform (PaaS), and Infrastructure as a Service (IaaS). They have done this for several reasons, including: This is taking place in both small- and large-scale enterprises. Threat actors have responded by targeting cloud services with increased frequency.

Unveiling Our Redesigned Website:

We are thrilled to announce the launch of our new website, a testament to Obrela’s commitment to excellence in the ever-evolving landscape of cybersecurity. As part of this commitment, we have revamped our website to provide you with an enhanced experience, making it easier for you to explore and discover more about our cutting-edge solutions.

Protecting your Enterprise with Penetration Testing

In the arsenal of cyber security tools available to organizations, the penetration test is a key component. Business applications, and organization infrastructure (operating systems, databases, networks, etc.) all have potential vulnerabilities, many of which are just waiting for threat actors to exploit.