Learn. Share. Secure. Access product knowledge, get certified, and collaborate with the global Securonix user community.
Join the discussion, ask questions, get solutions.
Discover product guides and helpful how-tos.
Join groups and collaborate with peers.
Stay up to date with our product team.
Share your ideas and suggestions with our team.
Discover and join upcoming events.
Explore Securonix solutions, products, and company insights
Access product guides, release notes, and technical documentation
Discover the ThreatQ threat intelligence platform and solutions
Find step-by-step guides, release notes, and troubleshooting resources
Discover and deploy integrations, extensions, and apps for the ThreatQ platform
Securonix Threat Research Security Advisory“VOID#GEIST: Stealthy Multi-Stage Python Loader with Embedded Runtime Deployment, Startup Persistence, and Fileless Early Bird APC Injection into explorer.exe”By Securonix Threat Research: Akshay Gaikwad, Sh
Service Principal Names (SPNs) associated with user accounts are prime targets for Kerberoasting attacks. Canary SPNs detect when attackers request service tickets for offline cracking.NOTE: When creating any kind of Cyber Deception in your organizat
How to Troubleshoot Logs Not Appearing in Securonix Audience: Securonix Administrators, Security Analysts, MSSPsProduct Module: Add Data → Activity | Operations Center → Job Monitor | Operations Center → Activity MonitorLast Updated: February 24, 20
Securonix Threat Labs 2025 Annual Autonomous Threat Sweeper Intelligence InsightsAuthors: Dheeraj Kumar and Sina Chehreghani Executive Summary:The 2025 Annual Cyber Threat Intelligence Report captures the year’s most impactful attack patterns across
How to Resolve the “We’ve Detected You Have Multiple Accounts” Message in Securonix Academy Audience: Securonix Academy LearnersProduct Module: Securonix Academy (Learning Management System)Last Updated: February 19, 2026KB ID: KB-20260219-academy-m
Clawdbot, Moltbot, and OpenClaw are not three separate malware families — they are the same open-source AI personal assistant, renamed twice within four days. Created by Austrian developer Peter Steinberger and launched in November 2025, the project
Audience: Customers, Partners, Administrators, Analysts, MSSPsProduct Module: Securonix Connect | Securonix AcademyLast Updated: February 11, 2026KB ID: KB-20260211-connect-academy-registrationTags: Securonix Connect, Academy, Registration, Login, Pa
Currently, the RF IOC enrichment action provides only a limited set of attributes, such as risk score and malware verdict. Malware attribution, however, is not included in the enrichment results.Since we are paying for an RF license, we would like to
We are pulling data from FS-ISAC into ThreatQ as an event. The issue I am facing here is that we are unable to get the indicators (specifically bank account numbers and phone numbers) ingested into the platform as an indicator.We need to be able to i
Canary Shares Canary shares are decoy network file shares strategically deployed across an enterprise environment to detect unauthorized network reconnaissance and lateral movement. These honeypot shares are configured with enticing names like "Finan
During an undetermined number of executions of my playbook, it crashes. Is there a way to validate how many executions have been performed and whether they are causing instability in my service?
When a feed fails—or while developing a new feed—users often download Feed Run files to troubleshoot and understand what went wrong.Currently, these files are automatically zipped and password protected. This design helps prevent the files from being
Already have an account? Login
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.