Next up for #GraylogLabs! We have a minor but functional enhancement to highlight for you—Graylog time-range stepping. To fix manual time-range adjustment limitations there are now 2 new time range nav buttons for stepping forward & backward through logs. ⬅️ ➡️ Learn more: graylog.org/post/sliding...
New from #GraylogLabs! Read up on the Caddy Webserver Content Pack that quickly turns raw logs into structured, searchable insights. It's available in Illuminate 6.4 & a Graylog Enterprise or #Security license + delivers ready-to-use parsing rules, streams & dashboards.
graylog.org/post/caddy-w...
#CVE202553770 & #CVE202553771 are critical remote code execution vulnerabilities impacting #Microsoft #SharePoint. In this blog we simulate the exploitation of this vulnerability & analyze the resulting telemetry inside #Graylog. graylog.org/post/adversa... #GraylogLabs #SharePointRCE #cybersecurity
🔍 When #threatactors gain unauthorized access to systems they leave behind clues. 🕵 And your #security team needs to find them to mitigate risk. Indicators of compromise can be network-based, host-based, email-based, behavioral, or 3rd-party. 🤔 Learn more.👇
graylog.org/post/17-comm... #GraylogLabs
#MustangPanda has been combining legitimate components with malicious payloads to reduce likelihood of detection. Could you spot Mustang Panda’s use of MAVInject in a campaign? Here we emulate an infection chain & analyze the activity it produces in #Graylog. graylog.org/post/adversa... #GraylogLabs
Getting log files into #Graylog is easy. 👍 But, it can be hard to set up parsing rules for your logs. 😓 What should you do when you have a log source that does not fall into one of the parsed out-of-the-box categories?
Find out, in this #GraylogLabs post. graylog.org/post/graylog... #cybersecurity
Just in time for your leisurely weekend reading we have our latest #GraylogLabs post!🕺🎉 Dive in & learn about regex patterns. Including:
🤔What regex means
❓What a regex function is used for
🖊️Writing a regular expression
✔️Using regular expressions
graylog.org/post/getting... #cybersecurity #infosec
Let's talk about why it's important to have accurate log message timestamps!
Read this #GraylogLabs article to learn about the problems that incorrect timestamps can create, several common causes of log message timestamp issues, and more. 🕗 🤔 t.co/SMyTv063PT #Graylog #cybersecurity #infosec
As you build out your #security program, it's important to know about some of the more critical #Windows Event IDs to monitor & what they mean.🤔
This #GraylogLabs post covers:
✔Logon events
✔Privilege use
✔Windows Server
✔Microsoft Defender Antivirus
graylog.org/post/critica... #cybersecurity
Enhance your #Graylog with the @nginx.bsky.social load balancing capability, to ensure peak performance!⛰💯
#NGINX will ensure that your Graylog cluster isn’t over-taxed, kind of like a well-organized team in which work is evenly distributed.🙌
graylog.org/post/load-ba... #GraylogLabs #cybersecurity
Lions & tigers & #AI? Oh my? 🦁/🐯/✖🐻✔🤖
In the log aggregation game, the biggest difficulty you face could be setting up parsing rules for your logs.😓
But, don't worry! This #GraylogLabs guide provides useful examples & links to the primary methods of parsing logs.
👇👀
graylog.org/post/graylog...
#Cyberattackers are just as invested in the #Microsoft ecosystem as they are in any other ecosystem. ☠️ 😒
👀 So, let's take a look at some of the more critical Windows Event IDs to be monitoring, plus what they mean. 👍👇
graylog.info/4852u6k
#cybersecurity #security #GraylogLabs