Blog - page 24

Name Changes for AI Engine Rules

With the current Knowledge Base release, LogRhythm Labs will introducing the first round of changes to AI Engine™ Rule organization. This initial stage involves implementing...

Read More

Automated PCAP Retrieval from Network Monitor

SmartResponse™ Plugins allow alarms that trigger in LogRhythm to launch actions—adding malicious hostnames to a blacklist, quarantining infected machines, removing users from an Active Directory...

Read More

The Diamond Model of Intrusion Analysis

Although every organization is a potential victim of cyber attacks and espionage, those in certain critical sectors—such as the Federal Government, energy, defense and finance—face...

Read More

Xfinity Pineapple

Notice: LogRhythm nor the author of this blog post are liable for any illegal activities conducted with this information. LogRhythm does not condone or support...

Read More

Identifying Compromised Accounts

Although the Heartbleed vulnerability allowed for credential theft on an unprecedented scale, account compromises have long been of significant concern to security operations. Even though...

Read More

Malware Analysis—Betabot Variant

A phishing email received by LogRhythm Labs, originating from a fake Facebook email address (no-reply@facebook-mail.com), encourages the recipient to click on the link to download...

Read More