Activity Feed
Explore the latest threat detections from the community.
Cobalt Strike Beacon Detected
Unusual C2 communication patterns consistent with Cobalt Strike. Lateral movement suspected.
Suspicious PowerShell Execution
A base64-encoded PowerShell command was executed, attempting to download a remote payload.
Potential Log4j Exploitation Attempt
An outbound LDAP query was observed from a public-facing web server, matching Log4Shell patterns.
Anomalous Login from New Geo-location
User account 'admin' logged in from an IP address resolving to a previously unseen country.
Phishing Link Clicked
User clicked a link in a phishing email from a known malicious domain. Endpoint requires isolation.
TOR Exit Node Connection
A server within the internal network initiated a connection to a known TOR exit node.
New Team Detection: Data Staging
Large volume of data compressed and staged in a temporary directory, awaiting exfiltration.
Team Rule: Lateral Movement via RDP
Anomalous RDP connection originating from a non-IT subnet to a critical server.