LogRhythm Labs

Living Off the Land Attacks with Scheduled Task

In our previous living off the land (LotL) blog post, we discussed why attackers use tools that already exist in the environment to plan an attack. But what role does Microsoft Scheduled Tasks in an attacker’s plan? In this post, we’re…

Read More

LogRhythm Labs: Cybersecurity Expertise Delivered into Your LogRhythm Deployment

What is LogRhythm Labs? LogRhythm Labs is the team that researches and creates the content that goes into the LogRhythm NextGen SIEM Platform. The team mission is to: Research and deliver world-class security, compliance, intelligence, and operational risk content to protect our customers…

Read More
4 Trending Phishing Techniques

4 Trending Phishing Techniques: Real-Life Examples and Tips for Detection

Many successful attacks begin with a phishing email that some user falls for. And that’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK. View the on-demand webinar with Ultimate Windows Security to learn about the…

Read More

Beware of Coronavirus Phishing Attempts — Tips to Keep Your Organization Safe

Coronavirus: it’s what every news outlet and person is talking about. With the outbreak of the infection, people want to stay up to date on the latest news and reports, so they’re looking up data and clicking on links to…

Read More

What Are Living Off the Land Attacks?

In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the…

Read More
Top 2019 Cybersecurity Themes

2019 in the Rearview, 2020 in the Windshield

2019 was a big year for IT security whichever way you choose to look at it. Huge volumes of records were exposed, loads of organizations experienced a ransomware attack, skimmers compromised countless websites, and European authorities issued massive fines under…

Read More
Cybersecurity Predictions for 2020

8 Cybersecurity Predictions for 2020

As we do each year, the LogRhythm Labs team came together recently to reflect on the year in cybersecurity and think about what’s to come. 2019 was definitely interesting. Breaches continued to keep organizations on their toes, with over 5,000…

Read More
The zero-day “baseStriker” vulnerability

Examining the baseStriker Vulnerability

The zero-day “baseStriker” vulnerability is still widely in use, but do you know what to look out for if it finds its way into your organization? While 18 months have passed since Microsoft developed a fix for the vulnerability that…

Read More
Panel of LogRhythm Experts Discuss Security Awareness Programs

Experts Weigh in on National Cybersecurity Awareness Program

In honor of National Cybersecurity Awareness Month, we sat down with some of our security experts to talk about their experience raising awareness in the industry and implementing cyber training. Read the interview to get their thoughts and some inspiration…

Read More
LogRhythmIT Operations Module Dashboard

Exploring IT Operations with LogRhythm

The LogRhythm NextGen SIEM Platform collects, classifies, and normalizes log data from over 800 unique source types. At LogRhythm, our focus has always been on identifying and mitigating security threats through monitoring, alarming, and event log correlation. And while we…

Read More