LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation.
Computer with a lock on the keypad

Cyber Kill Chain Steps and How to Defend Against APTs

The Cyber Kill Chain® methodology was developed by the military defense firm, Lockheed Martin, to address cyberattacks by identifying the pattern and behavior of cybercriminals as they carry out an attack. These actions are referred to as cyber kill phases.[1]…

Read More
Screen shot of GitHub showing LogRhythm.Tools information.

Automation Use Cases Using LogRhythm.Tools

LogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm API because you only need to run a PowerShell cmdlet to call an API function, rather than a direct interaction with your own…

Read More
Security analyst using MistNet NDR by LogRhythm

Combating Ransomware and APTs with MistNet NDR

“Greetings! Your company network has been hacked. All of your important files have been encrypted!” Last year NPR revealed that over 65,000 companies received a ransomware note like this, averaging seven attacks per hour. Unfortunately, things appear to be getting…

Read More
A phone screen accessing Amazon's website

Detecting Attacks on Amazon Web Services (AWS)

Amazon Web Services (AWS) is well known for its shared responsibility model: AWS is responsible for fixing the flaws in the infrastructure and its customers are responsible for configuring and adequately protecting their own data using access management or other…

Read More