LogRhythm Labs

Announcing the Winners of the Rule Your Network Challenge

Over the summer, LogRhythm hosted our first-ever public NetMon Hackathon on DevPost. The “Rule Your Network Challenge” offered large cash prizes for three categories. Here are the winners of the contest and our favorite submissions.

Read More

What is the GDPR and How Can You Prepare?

The General Data Protection Regulation (GDPR) is the world’s first attempt at implementing big data compliance regulation, and it seems to be inspiring some fear throughout the compliance industry. Now that GDPR has come to combat the uptick in cyberattacks, compliance has to evolve.

Read More

Breaking Down the Anatomy of a Phishing Attack

Detecting a spear phishing attack can often be like searching for a needle in haystack. However, your security operation center (SOC) analysts can use LogRhythm’s SmartResponse and AI Engine to rapidly detect and respond to these damaging breaches.

Read More

Mamba Ransomware Analysis

The LogRhythm Labs team provides analysis on Mamba—a strain of ransomware identified in 2016—after its recent resurgence. This goal of this in-depth analysis is to ensure users are prepared to protect their systems and to help prevent future infection of this malware variant.

Read More

How to Make Your SIEM Speak

Your security teams can be responsible for managing a number of logs, so how do you make malicious behavior and alerts stand out? Using LogRhythm’s SmartResponse, you can make your SIEM speak to you and audibly alert to a threat.

Read More

Identifying PowerShell Tunneling Through ICMP

Hackers are constantly looking for ways to bypass traditional network defenses, and exploiting the Internet Control Message Protocol (ICMP) as a covert channel for a reverse shell is a commonly used method for attack. However, you can use LogRhythm’s NetMon to identify PowerShell tunneling through an ICMP.

Read More

Analyzing ICMP Traffic with NetMon

No matter how old a internet protocol is, you must still consider it in your security operations program. Learn how to analyze ICMP traffic with NetMon.

Read More