Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Feeding Your First SIEM with Graylog

Before diving into our blog post topic, allow me to introduce myself. My name is Joel and I work with the solution engineering team at Graylog. Our primary task is to work with our customers and prospective clients on how to manage and make the most out of Graylog in their respective IT environments. One of our main tasks is to identify the logs sources they should incorporate and the kind of volumes they should anticipate.

Windows PowerShell Scripting Tutorial for Beginners

Windows PowerShell is a tool for task automation and configuration management that combines a command line shell with a scripting language. IT professionals rely on PowerShell to: Learning even a few basic set of Windows PowerShell commands and core scripting capabilities can help you achieve significant automation. To help, this PowerShell tutorial covers PowerShell scripting basics for beginners.

TargetCompany Ransomware Group AKA Mallox: A Rapid Evolution

The TargetCompany ransomware group, first identified in June 2021, garnered its name due to its distinctive practice of appending the names of the targeted organizations to encrypted files. Over time, the group has exhibited a dynamic evolution, frequently changing encryption algorithms, decryptor characteristics, and file name extensions.

What you can't do with Kubernetes network policies (unless you use Calico): Advanced policy querying & reachability tooling

In my previous blog post, What you can’t do with Kubernetes network policies (unless you use Calico): Policies to all namespaces or pods, I talked about this use case from the list of nine things you cannot implement using basic Kubernetes network policy — policies to all namespaces or pods. In this blog post, we’ll be focusing on the next use case — advanced policy querying and reachability tooling.

How To Reduce Attack Surface: 6 Proven Tactics

Security-oriented organizations continuously identify, monitor, and manage internet-connected assets to protect them from emerging attack vectors and potential vulnerabilities. Security teams go through every element of the organization’s security posture – from firewalls and cloud-hosted assets to endpoint devices and entry points – looking for opportunities to reduce security risks. This process is called attack surface management.

Can Firewalls Be Hacked? Yes, Here's 6 Vulnerabilities

Like all security tools, firewalls can be hacked. That’s what happened to the social media platform X in January 2023, when it was still Twitter. Hackers exploited an API vulnerability that had been exposed since June the previous year. This gave them access to the platform’s security system and allowed them to leak sensitive information on millions of users. This breach occurred because the organization’s firewalls were not configured to examine API traffic with enough scrutiny.

14 Step Checklist for a Flawless Network Security Audit

If security policies aren’t periodically updated to meet modern threat demands, organizations risk introducing vulnerabilities into their IT security posture. Comprehensive audit reports help security leaders gain in-depth visibility into their organization’s cybersecurity strategy and assess the resilience of its network infrastructure.

Breaking News: Panoptica Unveils Seamless Onboarding Experience!

Hey Panoptica Community, We've got some important enhancements to the Panoptica experience to share with you today. Brace yourselves as we introduce a fresh, user-friendly onboarding experience that's set to simplify and improve how you connect and engage with Panoptica!