Infosec News

SC Media

Sunspot Malware Scoured Servers for SolarWinds Builds That it Could Weaponize

The novelty of the malware “stems from how well it blends into the build process,” said Brian Coulson, principal threat research engineer at LogRhythm. “The adversary appears to have had great knowledge of the build process prior to the execution of…

Read More
CNBC Logo

Russian Hack Against the U.S. Government ‘Will Take Years to Overcome,’ Former National Intelligence Official Says

Susan Gordon, former principal deputy director of national intelligence, told CNBC that the massive cyberattack targeting federal agencies “will take years to overcome” as senior intelligence officials report there is little doubt the Russians were the perpetrators and that they’re still at…

Read More
Man working in office

7 Common CISO Pain Points and How to Overcome Them

Working in cybersecurity has its clear benefits: bringing value to a vital industry, competitive pay, and a thriving job market. With any career, however, there will always be pain points and some aspects that are less exciting than others. As someone…

Read More
Home device connected with mobile phone

Keeping Connected Devices Secure: National Cybersecurity Awareness Month Week 4

Do Your Part. #BeCyberSmart is the motto at the heart of this year’s National Cybersecurity Awareness Month (NCSAM). Promoted by the National Cybersecurity and Infrastructure Agency, the month-long event, now in its 17th year, offers key guidance in a world…

Read More
Computer screen of sourcing code.

What is the Zero Trust Model of Cybersecurity, Really?

The Zero Trust Model framework is the next evolution of our security model. Explore what exactly the Zero Trust model is and how companies have successfully implemented their own models. The Zero Trust Model Explained The original Zero Trust model…

Read More
State of the Security Team

5 Ways to Alleviate Stress on Security Teams

Security teams are under more stress than ever. While that fact may not exactly make you fall out of your chair with surprise, our recent research report found that a whopping 75 percent of security professionals say they have more…

Read More
Global Security Mag - The unique Cybersecurity dangers of Black Friday 2020, Logrhythm comments

Australia Comes Under Comprehensive, ‘State-Sponsored’ Cyber Attack, LogRhythm Comments

Today, the Australian Prime Minister Scott Morrison announced that the country is under sustained and sophisticated ‘state-sponsored’ cyberattack that is targeting all levels of government, essential services and business. The attacks have been happening for over a month and are…

Read More

Deepen Your Remote Desktop Protocol Visibility with Log Sources

Remote desktop is a common feature in operating systems. It allows a user to connect to a computer in another location and interact with the desktop remotely. Microsoft implemented this capability via its Remote Desktop Protocol (RDP) for Windows desktop…

Read More

Monitor Zoom Security and Privacy Risks Using the LogRhythm NextGen SIEM

The mass migration to remote working in recent times has caused an increased focus on the security of remote collaboration tools. LogRhythm has found a variety of these tools in our customer base and has built collection methods and analytics…

Read More

Beware of Coronavirus Phishing Attempts — Tips to Keep Your Organization Safe

Coronavirus: it’s what every news outlet and person is talking about. With the outbreak of the infection, people want to stay up to date on the latest news and reports, so they’re looking up data and clicking on links to…

Read More