Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation.

TalkTalk Customer Data Breached

Last week it was revealed that UK telecommunications company TalkTalk suffered a data breach in 2014, where customer details—such as account numbers, names and addresses—were stolen. The stolen details were then used by scammers to trick people into believing they…

Read More

Simulated Cyber Threat Thwarted at London’s BT Tower

Earlier this week, a simulated cyber terrorist strike took place at London’s BT Tower. The event—part of the UK government-backed Cyber Security Challenge—was designed to mimic a sophisticated cyber-attack and tested the ability of amateur contestants to defend the building’s…

Read More

Lights, Case, Action!

LogRhythm released Case Management in its most recent update, and while I could wax lyrical about the merits of why you should be using this feature, I won’t. Instead, I’ll show you a brief video demonstration of the new feature…

Read More

Detecting Lateral Movement From ‘Pass the Hash’ Attacks

Pass-the-hash attacks exploiting Windows operating systems aren’t anything new, in fact they’ve been around for donkey’s years; however, despite the exploit being nearly two decades old, still not much is known about the attack vector. So, in this post, I’ll…

Read More