This guide provides step-by-step instructions for using Active Threats in the Threat Detection Marketplace, including discovering threats that provide real-time CTI and reviewing detailed threat information, detections, and AI-enriched context, allowing security teams to identify and address threats within minutes.
Accessing the Active Threats
Access your SOC Prime account and navigate to the Threat Detection Marketplace.
Make sure you’re on the Active Threats module: Active Threats acts as a home page for Threat Detection Marketplace.
Visualization Dashboards
At the top of the page users can find dashboards displaying current metrics on active threats. The view is collapsed by default. To expand the view, select the View Dashboard button.
The dashboards present the following:
Threats Addressed: The number of threats addressed by your team in comparison to newly discovered threats over the last three months. Each column represents a calendar week and displays the number of threats your team addressed (the threat is addressed if at least one detection is downloaded or deployed), compared to the total number of threats released by SOC Prime during the same week.
Note: If there are no relevant updates during some calendar week(s), the corresponding column(s) won’t be visible on the chart.
Top 3 Techniques Used: A list of the most common MITRE ATT&CK techniques in recent threats, which helps prioritize mitigation tactics.
Top 3 Active Actors: The top three threat actors active in the last period, providing insights into adversary patterns and tactics.
Active Threats Feed
The Active Threats feed displays a list of the most recently identified threat news items, with the newest threats appearing at the top.
Use the search bar at the top to quickly find the needed news items. Enter a query in a human language. The system processes your request, displays the related news items, and generates a summary based on relevant source articles. Select Research in Uncoder to view the full text of the summary and explore threats details relevant to your query.
Each news item tile contains the following information about the threat:
Publication date: The date when the threat was published
Views number: How many times the news item has been viewed
SOC Prime Bias: The severity of the threat
Threat Type: The category of the threat
Affected Industry: Industries most impacted by the threat
Affected Geography: Geographical areas most impacted by the threat
Source: Article or report on which the threat was based
Note: If there are multiple options for Threat Type, Affected Industry, or Affected Geography, the first option is displayed, followed by the number of additional options in brackets. Hover over the corresponding field to view all options.
Active Threats News Item Page
By selecting a threat news item, you will be redirected to the page containing the detailed, actionable information about the threat.
The top of the page includes:
Threat overview: Threat’s severity, number of views, publication date, and link to the source article. Click the link to get more details on the discovered threat.
Detection Stack tags: Display the detection type associated with the threat. A tag is highlighted in green if there is at least one detection of that type that can detect the threat.
Query: Search over data for hunting/triage; may not auto-alert.
This tag is applied if at least one rule has at least one translation of type Query.
Alert: Rule-triggered signal indicating activity to review or escalate.
This tag is applied if at least one rule has at least one translation of type Alert.
ETL: Data pipeline stage: extract, normalize, and load telemetry.
This tag is applied if at least one rule is defined with
sigma type: IOC.AIDR: GenAI protection gateway that runs rule/similarity/code/ML/LLM checks to detect & block prompt-injection and harmful content before it hits AI apps.
This tag is applied if at least one rule has a Semgrep translation.
Share: Select the Share button to share the news item.
On the left, four tabs provide detailed information about the threat. Switch between the tabs to explore available details.
AI Summary
The AI Summary tab provides a high-level view of the threat context. Use this tab to quickly assess the threat’s relevance and initial response actions. Here’s how to use each section:
Summary: Review the AI-generated summary to understand the threat’s primary characteristics.
Investigation: This section contains recommended actions for investigating the threat.
Mitigation: This section contains recommended actions for mitigating the threat according to the best security practices. Use this as a quick reference to implement defensive measures.
Response: This section contains recommended response actions to minimize the risks of the threat. Use this as a quick reference to implement defensive measures.
On the right, the AI Summary tab displays the following threat attributes:
Threat Type: Explore the classification of the threat to better understand the attack intent.
Affected Industries: Explore the list of industries most impacted by the threat. This information helps assess the relevance of the threat to your organization.
Affected Geographies: Explore the list of geographical areas most impacted by the threat. This information helps assess the relevance of the threat to your organization.
Actors: Explore the list of threat actors related to the threat, which can help in tracking patterns and associating them with known campaigns. Dive into more context by clicking on a certain threat actor:
Actor description
Associated groups
Sub-Techniques: Dive into AI-enriched data on MITRE ATT&CK techniques used by adversaries in this threat context. Familiarize yourself with these techniques for deeper insights into potential attack methods. Dive into more context by clicking on a certain item from the list:
Sub(technique) description
Related tactics
Tools: Explore the list of known adversary tools related to the threat, which can help in tracking patterns and associating them with known campaigns. Dive into more context by clicking on a certain tool:
Tool description
Associated software
CVE: Explore the list of Common Vulnerabilities and Exposures (CVEs). For more details, click on a certain CVE from the list and see its description.
Note: Some threat attributes may not be displayed, depending on data availability.
Attack Flow
This tab provides an AI-generated visualization of the adversary activity helping better understand how the threat operates and track the sequences of behaviors that adversaries employ to achieve their goals. The threat visualization is presented in diagram and matrix formats.
To view the diagram representation, select the Flow tab. You can do the following:
Drag and drop the blocks
Open the visualization in full screen
Change scale
Return to the starting point
Export the visualization as MMD
To view the matrix representation, select the Matrix tab. You can do the following:
Open the visualization in full screen
Return to the starting point
Export the visualization as MMD
Detections
This tab provides the list of the detections that can identify the selected threat. The detections are grouped into the following categories:
Behavior Rules: Detections created by human experts.
IOC Queries: IOC queries automatically generated using the SOC Prime proprietary algorithms.
AI Rules: Detections created by the SOC Prime AI models.
Hover over the rule tile to see if the rule has already been deployed.
The Behavior Rules might include key references about the threat. To access the links, hover over the rule tile, select External Research, and click the links to dive into the context.
To explore the detection details, hover over the detection tile, click the View button, and you will be redirected to the rule/query page with the following tabs:
Detection Intelligence: Provides threat intel and relevant metadata, including media links, threat timeline, false positives, audit configuration and triage recommendations, short and full summaries, decision trees, binaries, tags, and MITRE ATT&CK coverage data.
Detection Code: Displays the rule/query code convertible to the available SIEM, EDR, and Data Lake language format to further run a rule/query in your environment.
Validation: The tab is available only for the AI Rules and represents the simulation of malicious activity that the rule is intended to detect.
Simulations
This tab provides the list of simulations of malicious activity that the AI Rules are intended to detect. Hover over the rule tile and select the View button to view the simulation details.
At the bottom of the page, you can see related threats, if any. Click View all active threats to return to the Active Threats feed.
Best Practices for Using Active Threats
Monitor Regularly: Regularly check the feed to stay updated on new threats, vulnerabilities, and threat actor activity.
Prioritize Based on Threat Relevance: Use the industry and geography-specific insights to assess the relevance of each threat to your organization.
Implement Detection Rules: Apply detection rules from the Detections tab to enable immediate monitoring for active threats.
