December 10, 2025
© 2025 SOC Prime Inc.
All rights reserved. This product and documentation related are protected by copyright and distributed under licenses restricting their use, copying, distribution, and decompilation. No part of this product or documentation related may be reproduced in any form or by any means without the prior written authorization of SOC Prime. While every precaution has been taken in the preparation of this book, SOC Prime assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Active Threats on SOC Prime Website
SOC Prime Platform release 6.1.3 introduces Active Threats, now also available on the SOC Prime website, to offer more possibilities for defenders to explore the latest threats deployed by malicious actors with attack flows, actionable detection rules, and simulation instructions continuously updated. To access the news feed, select Resources > Active Threats from the main website navigation.
Google SecOps API: Pull Curated Detections in Inventory
With the latest Platform release, we’ve added the ability to pull curated detections from Google SecOps to Inventory, enabling SOC Prime customers using Attack Detective to perform Content Audits across the entire detection stack. The new Google SecOps API now supports this functionality.
Curated detections serve as a set of YARA-L rules created and managed by GCTI for Google SecOps customers. Rule sets act as a collection of curated detections, allowing Google SecOps customers to enable or disable them within their Google SecOps account and turn on or off alerts for these rules.
To implement the ability to pull curated detections from Google SecOps to Inventory, we've created a new API endpoint. The system pulls curated detections as Rule Sets, with each content item saved as a Google SecOps Rule with the following details:
Rule title
Rule author
MITRE ATT&CK® tactics and techniques
Rule body – includes the following placeholder: "This content item represents a curated rule set from your organization’s Google SecOps instance. Curated detections can only be edited by Google SecOps, so all of the normal rule editing options are missing (see https://cloud.google.com/chronicle/docs/detection/curated-detections). It’s pulled only for tracking your full MITRE ATT&CK coverage."
Additional metadata (except for log sources)
Note: Rules as part of Curated Rule Sets are not used in Jobs and Attack Detective Scans. However, they can be applied in the Attack Detective Content Audits.
Google SecOps Data Plane Updates
To enable pulling curated detections from Google SecOps to Inventory, we’ve added the Take Inventory of Curated Content toggle switch to the Google SecOps Data Plane. It is visible to the users ONLY IF Cloud Chronicle API, Automation, and direct deployment from a Sigma rule page are selected, and it is disabled by default. The Take Inventory of Curated Content toggle switch goes with the following tooltip for a better user experience: “Enable to allow pulling curated rule sets metadata when taking inventory to track MITRE ATT&CK coverage and run content audits in Attack Detective.”
To pull curated detections, ensure that the Take Inventory of Curated Content toggle switch is ON in the Data Plane settings.
As part of these updates for Google SecOps customers, we’ve also implemented the following:
Pulled MITRE ATT&CK tags for Google SecOps and converted tags to uppercase for proper parsing
Disabled the deployment of curated detections from the content item page
MITRE ATT&CK® v18.1 Support
In October 2025, MITRE ATT&CK v18 was released, with significant changes to the defensive side of the framework, including the shift from technique-level Detections to Detection Strategies, substantial revisions to Data Components, and the deprecation of Data Sources.
With this Platform release, we’ve updated ATT&CK to the current version 18.1 to keep up with the latest framework changes and improvements.
Data Components Support for ATT&CK Techniques and Sub-Techniques
Due to the Data Components refinements in the major framework version update, we’ve also added Data Components to ATT&CK techniques and sub-techniques, more specifically:
Removed the Data Source from the Data Component field and added the ID
Added all related Data Components for each technique and sub-technique, and vice versa
Updated the custom content
Updated existing Search Profiles to ensure they include the new Data Components structure, where ID is used instead of the name
Expert Filters Updates
To align with MITRE ATT&CK v18, where Data Sources are no longer supported, we’ve removed the Data Sources filter from Expert Filters on the Search page and updated the Data Components filtration.
Other Updates
In addition, as part of this major transition, we’ve implemented the following:
Updated the framework version in Attack Detective
Updated the ATT&CK Navigator in the files that are exported or opened in the Attack Detective Data Audit
Company Website Updates
With the latest Platform release, we’ve published a new customer success story with Netox Oy, showcasing how the partnership with SOC Prime enabled the leading MDR provider to reduce detection engineering efforts by 70% while improving detection quality and achieving a 35% decrease in false positives.
Content Quality Improvements
We continuously enhance the accuracy and reliability of detection content translations across a wide range of SIEM, EDR, and Data Lake query and rule formats. With the SOC Prime Platform release 6.1.3, we’ve introduced a set of improvements for translations to the following supported platforms listed below.
QRadar
To improve the experience for QRadar customers using the latest versions, we’ve made the alternative translation alias v7.4.3 the Original one. This change eliminates the need to switch to an alternative translation each time, reducing friction and streamlining daily workflows. The current Original translation has been replaced with an alternative translation pre-v7.4.3.
Microsoft Sentinel
As part of the Microsoft Sentinel transition from Sigmac to Uncoder, we’ve added summarize and count to the parser to enable proper translation handling and avoid syntax errors.
Elastic ES|QL
We’ve improved the quality of ES|QL translations by fixing an escaping issue, ensuring the "." character is properly escaped, similar to Lucene’s case-insensitive syntax rules.
Google SecOps
We’ve improved Sigma-to-Google SecOps (YARA-L) translations in Uncoder AI by fixing an issue where the generated code incorrectly used $event as the second parameter instead of the actual required parameter, ensuring accurate and reliable output.
Threat Detection Marketplace
Active Threats
Active Threats Advanced Limitation Pop-Up
As part of the latest Active Threats updates, we’ve updated the text on the limitation pop-up that is displayed to SOC Prime users who don’t have access to the Active Threats Advanced module when attempting to open content not available to them.
Attack Flow JSON Export Support
With this release, we’ve added support for JSON export from the Attack Flow tab in Active Threats. On the Attack Flow tab > Matrix view mode, SOC Prime users can now click the Download button to export the Attack Flow matrix visualization in JSON format. To enable this functionality, we’ve also fixed the MMD file syntax, which is used to export Attack Flow from Active Threats and Uncoder AI.
MITRE ATT&CK® & Log Source Coverage Pages: Filtering by Custom Repo
With this latest SOC Prime Platform release, we’ve added the ability to filter by a Custom Repository on the MITRE ATT&CK Coverage and Log Source Coverage pages.
To implement this functionality, we’ve added the Repositories drop-down menu, acting as an additional filtering option. For a more intuitive experience with the filtering functionality, we’ve added a tooltip on hover: “Filter the coverage by content in a specific custom repository.” If the Repositories filter is not applied, it will have an empty value. All Custom Repositories are now available to the current user to be used for filtering, including their own or shared across the company.
When selecting a specific Repositories filtering option, all the data is displayed for the selected Custom Repo.
As part of these changes, we’ve also performed the following improvements:
Updated the Explored and Deployed Trend chart
Added the ability to display Explored and Unexplored stats for custom content data that will be displayed on the MITRE ATT&CK Coverage page > All Content chart.
Manager Role User Invitations Across All Domains Linked to a Company
With this release, we’ve added the ability for SOC Prime users with the Company Manager role to invite other users into the Company, provided that their email domain matches an existing Company domain.
Unified View of Usage Counters
With this SOC Prime Platform release 6.1.3, we’ve added a set of UX improvements to the usage counters (e.g., for Attack Detective Audits and Scans), which were previously visible only when a user navigates across the Platform and opens the user profile menu. This update allows SOC Prime customers to see all relevant usage counters for each active product within their subscription in a centralized location.
In the Account Settings > Subscriptions, we’ve:
Added color-coding to distinguish between subscription types:
Green for a free subscription
Gold for a paid one
Fixed the alignment of the Expiration Date column
Updated the Subscription usage counters and their values:
In TDM: the Premium Rules counter now displays the Sigma rule balance
In Uncoder AI: Queue has the “Priority” value if the Uncoder AI subscription is paid, and “Regular” if it's free
In Attack Detective*: Scans and Audits counters display the corresponding balance, while Premium Rules display the Sigma rule balance according to the current Attack Detective subscription
*Note: The counter, which displays the available number of Premium Rules for Attack Detective, doesn’t correspond to the Sigma rule balance available for Threat Detection Marketplace.
On the user profile menu, we’ve updated the styles and counter values to be consistent with the Account Settings styles and values. These values are now accessible to the users, no matter what product they are viewing at the moment.
Help Center Updates
To deliver an intuitive user experience and make sure the Help Center is in sync with the latest Platform changes, we’ve removed the following outdated items from its menu:
Product Tours
Threat Bounty
The updated Help Center now includes Resources to walk users through the Platform functionality, share expertise, and provide details about the latest updates, plus the Get Support section with options to reach out to us for questions, suggestions, or assistance.
UX Improvements
With this latest release, we’ve made the following enhancements to the Threat Detection Marketplace to ensure an improved experience with the Platform functionality:
Removed the pop-up that prompts users to add Custom Field Mapping
Updated the styles on the Leadersboards and Dashboards pages, including drop-down menus, pagination, and charts, to ensure a consistent look and feel with Active Threats and other similar UI elements on the SOC Prime Platform
On the Lists item page, removed the Type column from the table of included content items to eliminate ambiguity and improve clarity
Key Bug Fixes & Improvements
Related to Presets:
Resolved the issue when an attempt to create a Splunk Preset caused a 500 Internal Server Error.
Fixed the issue when, in some cases, Presets couldn’t be edited after creating them.
Fixed the issue that, in some cases, could cause delays when removing a Preset via the Delete button.
Made improvements to Uncoder AI functionality when using the Translate tab. If the
languagefield in thedetectionis the same during translation from Roota, the system will now return the rule body in the target language panel.Fixed the clicking settings display issue on the Uncoder AI Generate tab that appeared in certain cases when clicking the Gear icon during the process of query generation from a raw threat report.
Fixed a minor UX issue on the API page when the Add New Key button appeared with incorrect margins.
Resolved the translation issue from Roota to the Google SecOps language format.
For an improved user experience and clarity, we’ve updated all Content Audit notifications in Attack Detective to specify that the functionality applies only to Splunk Cloud rather than Splunk on-premises environments.
Resolved the issue with the Mark as Deployed button on the content item page > Microsoft Sentinel Query tab, which, in some cases, didn’t change its status.
Resolved the Uncoder AI issue during content translation to the Microsoft Sentinel Query format to enable the validation of the
hashesfield with modifiers.Fixed the issue that caused users to be logged out of the SOC Prime Platform in some cases after periods of inactivity of one hour or longer.
Resolved a minor UX issue in Uncoder AI when, in some cases, the platform name on the target language tab was overlapped by the AI preloader.
