Skip to main content

Sec-Ops is proud to present the industry leading Release 5
 

Available in the Security Operations application.

The Devo SciSec Team (Devo’s Threat Research Team) has released more out of the box detections for the Devo Security Operations Content Stream.

Release 5 bring the total number of out-of-the-box detections to 355 and making Devo the market leader in ready to use detections for Microsoft Azure!

This latest release continues Devo’s emphasis on Cloud Security Monitoring as a key use case, containing a large number of detections for Azure, Office 365, and Google Workspace. Additionally, Devo has expanded its out of the box coverage for Windows, and AWS, which are commonly ingested into Devo and critical for maintaining security monitoring.

Head on over to our Docs to view full release notes!

 

Here is a sample of 5 of the new alert descriptions:

  • A Google Access Transparency log event has been generated. Google is accessing your data.
  • An adversary may steal application access tokens as a means of acquiring credentials to access remote systems and resources.
  • A government-backed attacker could try to steal a password or other personal information of one of your users by sending an email containing a harmful attachment, links to malicious software or to fake websites.
  • An attacker could steal the credentials of one of your users.
  • An attacker could steal the credentials or the mobile device of one of your users.

See the full release notes here.

Great stuff @juan.delrio ! Could we clarify, are these detections only of use to customers who use Security Operations, or do we have content that can be of use in the core platform, too?


Hello Raph!   Yes this release is for the Devo Security Operations product, we fixed the tagging and will add a note to make it clear.