How to Detect and Respond to SS7 Attacks — OT Telco Use Cases
Posted by: Leonardo Hutabarat
In the telecom environment, using Signaling System No.7 (SS7) protocol is very crucial, especially in 2G networks. If you’re wondering how SS7 works, SS7 protocol is an international telecommunications standard used to set up public switched telephone network (PSTN) and…
Read More
December 28, 2020
How to Detect and Search for SolarWinds IOCs in LogRhythm
Posted by: LogRhythm Labs
LogRhythm Labs has gathered up the indicators of compromise (IOCs) from CISA, Volexity, and FireEye associated with the recent SolarWinds supply chain attack and made them available in a GitHub repository for your convenience. Feel free to download and import…
Read More
December 23, 2020
Detecting Hard-Coded Credentials with LogRhythm
Posted by: Dan Crossley
Hard-coded is a term used to describe when a software developer embeds data directly into the source code of a program or script, rather than supplying it externally as a parameter. If the data consists of user credentials, this can…
Read More
December 22, 2020
Threat Hunting Framework: Three Steps to Translate Threat Reports into Actionable Steps
Thanks to Sally Vincent and Dan Kaiser from the LogRhythm Labs team for developing the process and guiding content described in this post. Threat research can be an invaluable asset to security teams when attempting to formulate a proactive stance…
Read More
December 21, 2020
LogRhythm Web Console Vulnerabilities
Posted by: Private: Zack Rowland
Scope High-risk vulnerabilities have been identified in the LogRhythm Web Console. Risk The risk of these vulnerabilities is high. However, “real-world” exploitation of the vulnerabilities does require certain pieces of information about the target organization’s LogRhythm NextGen SIEM and Web…
Read More
December 16, 2020
How to Mitigate Docker Container Security Risk
The use of Docker containers is rapidly becoming the standard approach for most companies to deploy services in their environment; however, it also introduces risks and vulnerabilities. Explore the pros and cons of containers and how to mitigate Docker container…
Read More
December 15, 2020