{"id":3633,"date":"2026-04-06T13:00:00","date_gmt":"2026-04-06T13:00:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=3633"},"modified":"2026-04-06T13:00:00","modified_gmt":"2026-04-06T13:00:00","slug":"multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=3633","title":{"rendered":"Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps"},"content":{"rendered":"<p>Your attack surface no\u00a0longer lives\u00a0on one operating system, and neither do the campaigns targeting\u00a0it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking advantage of the fact that many SOC\u00a0workflows are still fragmented by\u00a0platform.\u00a0<br \/>\nFor security leaders, this creates\u00a0a<\/p>","protected":false},"excerpt":{"rendered":"<p>Your attack surface no\u00a0longer lives\u00a0on one operating system, and neither do the campaigns targeting\u00a0it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3634,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-3633","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3633"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3633\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/3634"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}