A Picture Paints a Thousand Logs
The saying “a picture is worth a thousand words” has a lot of truth to it. And in the same manner, “a picture can be...
Read MoreThe saying “a picture is worth a thousand words” has a lot of truth to it. And in the same manner, “a picture can be...
Read MoreI’m excited to share LogRhythm 7 (LR7) with you today! We built LR7 to help organizations dramatically improve their ability to detect, respond to and...
Read MorePowerShell is one of the best post-exploitation tools out there—simply because it’s already built in to every modern Windows system. And like the name states,...
Read MoreJoe Partlow, CISO, is a guest blogger from ReliaQuest. He has been involved with InfoSec in some capacity or role for over 15 years, mostly...
Read MoreWhen it comes to a cyber-attack, it is no longer a question of if your company will be hacked but when. Companies from 2 to...
Read MoreDetect Threats, Passively Identify Devices and Selectively Capture Packets NetMon release 2.7.1 implements the ability to add custom scripting rules that can run on every...
Read MoreCollaboration between Thomas Hegel and Greg Foss. For Black Hat this year, Labs decided to try something new and put together a packet capture analysis...
Read MoreLive incident response and forensic data acquisition is often a very manual and time consuming process that leaves significant room for error and can even result in...
Read MoreLast week, Info-Tech Research Group released their 2015 SIEM Vendor Landscape Report. The report evaluated ten SIEM vendors on overall product attributes, capabilities and market...
Read MoreOver the last few days, we have been identifying another new phishing attack attempting to steal domain credentials. This particular example is isolated around the...
Read More