Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

NotPetya Technical Analysis

In our Detecting Petya/NotPetya post, we described the way in which NotPetya (or “Nyetna” as it has also been named) spreads to other systems on the network without use of the ETERNALBLUE/ETERNALROMANCE SMBv1 exploits. (Although the code contains the ability…

Read More

Deploying NetMon Freemium at Home to Monitor IoT Devices

Why Monitor IoT Devices at Home? LogRhythm’s NetMon Freemium is a powerful and easy-to-use product, so why not fully realize its potential both at home and in the office? In-home Internet of Things (IoT) devices, such as sensors, lights, cameras,…

Read More

Winner! Winner! Black Hat Dinner!

We’re pleased to announce we have a winner for our “Win a Trip to Black Hat” contest. Thank you to the several hundred who entered. Over 200 of you passed the test! Curious to see how you may have fared…

Read More

Detecting Petya/NotPetya Ransomware

Petya / NotPetya Poses Risk to Even Patched Systems On the morning of June 27, 2017, a new ransomware outbreak—similar to the recent WannaCry malware—was discovered in the Ukraine. The malware quickly spread across Europe, affecting varied industries such as…

Read More

PCI-DSS Compliance 3.2 Updates

Whether you swipe it, chip it, tap it, or phone it in, if you are involved in capturing payments from a credit card, you are most likely required to comply with Payment Card Industry Data Security Standard (PCI-DSS) requirements. PCI-DSS…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers