Closing Thoughts from Infosecurity Europe

Over the past few days, I’ve had the privilege of being part of LogRhythm’s presence at the Infosecurity Europe 2018 conference. As the conference ends, I’ve put together my top three takeaway messages from an amazing conference!

Read More

Take a Deep Dive into PlugX Malware

Although there have been several variants over the years, an analysis of the timeline of variants discussed demonstrates the "original" PlugX variant continues to be used today.

Read More

Insider Threat Use Case: Detecting and Stopping Cryptojacking

We detected and stopped an insider threat before this individual turned LogRhythm into a part-time cryptocurrency mining operation. This highlighted the need for focused user entity and behavioral analytics (UEBA) across the organization, as business threats can come in many shapes and sizes.

Read More