Threat Intelligence Report – Active Webshell: Big Bang Bot
Alert Logic security researchers share threat intelligence details for a new active webshell threat that is being used as a dropper or precursor for additional malware and exploits.
Attackers Have Compressed and Accelerated the Cyber Killchain
While analyzing data for the Critical Watch Report, Alert Logic researchers determined that attacks have accelerated and compressed the cyber killchain.
4 Benefits of a Security Operations Center
A look at some of the primary reasons most organizations will benefit from working with a third-party Security Operations Center (SOC).
Why SIEM Is a Process, Not a Product
Alert Logic’s Dan Pitman looks at some of the issues organizations face with SIEM (security incident and event management) tools and why the value of a SIEM is a function of how effectively it is managed and maintained.
Apache Struts Vulnerability Exploited in New Cryptomining Attack
The Alert Logic Active Watch team digs into the latest Apache Struts vulnerability with a deeper technical analysis and the discovery of a malicious payload.
How to Prevent Self-Inflicted Cloud Security Threats
The cloud threat landscape is vast, but the reality is that the biggest issues are self-inflicted through poor configuration and security controls.
Emerging Threat: Active Exploit of Apache Struts Remote Code Execution Vulnerability
Researchers have discovered proof-of-concept code for a new Apache Struts remote code execution vulnerability.
Intrusion Detection for Containers Q&A: What’s Next for Alert Logic’s Container Security Initiatives
The third in a 3-part Q&A series that examines container security and the role of network intrusion detection in a container environment.
Take a Proactive Approach to Security with Threat Hunting
Dr. Jonny Milliken, Threat Intelligence Manager for Alert Logic, and Holger Schulze, CEO of Cybersecurity Insiders, recently presented a threat hunting webinar on the value and importance of threat hunting.
Intrusion Detection for Containers Q&A: NIDS vs. HIDS and the Importance of Metadata for Container Security
Part 2 of the intrusion detection for containers Q&A series delves into the distinction between host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) and why that matters.
Intrusion Detection for Containers Q&A: A Critical Part of the Container Security Landscape
A Q&A with Alert Logic’s Matt Harkrider and John Norden about the issues organizations face when it comes to securing containers and containerized applications.
What You Need to Know about GDPR and the 72-Hour Breach Notification
A look at articles 33 and 34 of the GDPR (General Data Protection Regulation) and how to address the challenge of the 72-hour breach notification requirement.