Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

Identifying PowerShell Tunneling Through ICMP

Hackers are constantly looking for ways to bypass traditional network defenses, and exploiting the Internet Control Message Protocol (ICMP) as a covert channel for a reverse shell is a commonly used method for attack. However, you can use LogRhythm’s NetMon…

Read More

Analyzing ICMP Traffic with NetMon

The Internet Control Message Protocol (ICMP) is one of the foundational internet protocols that define how systems talk to each other. Commands such as ping and traceroute are supported by ICMP. Based on request for comments (RFC) 792, ICMP has…

Read More

Northampton County Improves Visibility and Automation with LogRhythm

LogRhythm Enhances Efficiency by Streamlining Security Operations Bob Mace, senior information security analyst, leads a small IT team to manage and secure Northampton County’s IT infrastructure. As the team faced mounting challenges and time-consuming manual processes, Mace turned to LogRhythm.…

Read More

Automate Project Management with SmartResponse

The SIEM is a great central aggregate for case data and analytics, but also has the ability to give your team back valuable time if you take advantage of automation. The more automation you can build into a SIEM, the…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers