|
By Vadim Beregovsky
In the modern digital world, API’s are no longer just “connectors” – they are the real security product. Whether you are a Fintech processing payments, a SaaS platform managing multi-tenant data, or an E-Commerce giant handling the bulk of sales, your API’s are the foundation of your customer registration, checkout experiences, and partner ecosystems. However, that transition has made API’s the fastest-growing attack surface in history.
|
By Yoni Farin
We want to transform how companies make decisions. That is not what you expect to hear from an observability company. Observability tools are supposed to help you monitor systems, debug incidents, and maybe reduce downtime. Useful, but not exactly the foundation for business decision making. So what does observability have to do with revenue, churn, or customer experience? More than you think, because observability already sits on top of the most important data in your business.
|
By Kiran Sethumadhavan
On April 6, 2026, Microsoft Defender Security Research published an advisory detailing a large-scale phishing campaign that leverages the OAuth Device Code Authentication flow to compromise Microsoft 365 accounts across organizations globally. This campaign represents a significant evolution from manual social engineering to fully automated, AI-driven attack infrastructure.
The modern workplace has a new “system of record,” and it isn’t email. Today, approvals, incident coordination, customer escalations, vendor conversations, quick file shares, and “can you grant access?” requests happen in Slack channels, Teams chats, and Google Chat spaces, often at a pace that makes formal controls feel optional.
|
By Anurag Jain
Incident response in the cloud is derailed not by a lack of skill, but by a lack of visibility. Security teams frequently discover critical blind spots only after an incident is already underway, leading to delayed containment, inaccurate attribution, and incomplete forensic analysis. This report walks through six realistic, real-world inspired scenarios where missing log sources prevented effective investigations.
|
By Hetram Yadav
As organizations continue to scale their AWS environments, security teams face increasing challenges in detecting cloud-native threats such as compromised credentials, misused APIs, container breaches, and malicious workload behavior. Traditional perimeter-based controls and legacy endpoint tools are often insufficient in dynamic, cloud-first architectures. AWS GuardDuty provides native,intelligent threat detection for AWS environments.
|
By Abhishek Lal
The modern cloud security landscape is often fighting a war on two disconnected fronts. On one side, we have Cloud Security Posture Management (CSPM) platforms like Wiz, which act as the cartographers of risk—mapping terrain with high fidelity to identify open ports, unpatched vulnerabilities, and toxic permission combinations. On the other hand, we have Runtime Defense tools (SIEM, EDR, NGFW) that generate massive streams of activity logs.
|
By Albert Nieves
Today Coralogix announced U.S. Department of Education Sponsorship for FedRAMP Authorization. Government agencies currently face a critical balancing act. On one side, there is an urgent mandate to modernize operations and adopt artificial intelligence to improve services. On the other, there are strict requirements for security, compliance, and data sovereignty that cannot be compromised.
A critical vulnerability identified as CVE-2025-14847 (dubbed “MongoBleed“) affects MongoDB Server instances, exposing systems to unauthenticated information disclosure. This vulnerability allows a remote attacker to read sensitive data from the server’s memory without requiring authentication.
|
By Daniel Kerman
Effective threat hunting requires both comprehensive visibility and quick, data-driven insights. Olly, the AI-powered observability teammate within Coralogix, provides just that. Whether you’re tracking lateral movement, uncovering stealthy persistence, or correlating spikes in anomalous activity, Olly rapidly pinpoints the evidence and presents it in context so you can confirm or dismiss threats before they escalate.
|
By Coralogix
What happens when 20,000 engineers descend on Amsterdam to talk about Kubernetes and AI? Welcome to Episode 1 of Live Laugh Logs, the podcast from Annie, Lewis and Andre from the Coralogix Developer Relations team where we will get together and recap everything going on in our worlds! We had an amazing time at KubeCon in Amsterdam and had loads of insights from the talks we went to around designing observability systems, all the AI tools being created and how to observe them, and using agent-generated code.
|
By Coralogix
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. With a hybrid environment of both single and multi-tenant infrastructures generating massive amounts of data, the team needed a powerful solution to centralize and manage their log data. In this session, Armis’s Head of DevInfra Roi Amitay discusses how his team leverages Coralogix’s unique capabilities together with custom-built dev tools to streamline the development and debugging of microservices on multiple EKS clusters.
|
By Coralogix
In this session, Harel Ben-Attia, Chief Architect at Coralogix shares the model we have implemented in order to create a resilient and scalable streaming data pipeline and how we had to rethink our entire approach to message processing from the ground up in order to achieve our goals.
|
By Coralogix
During complex investigations, it is common to come across some logs that are key to the root cause analysis process. As part of your workflow, you might need to quickly jump to these specific logs, share, or draw attention to them. This new feature helps you do just that by enabling you to highlight and send them as links.
|
By Coralogix
Metric alerts allow users to be notified based on metric behavior. Common use cases are.
|
By Coralogix
The Coralogix new logs screen is easier to navigate and allows you to rapidly build queries, visualizations, and custom views.
|
By Coralogix
Streama© technology allows us to analyze your logs, metrics, and security traffic in real-time and provide long-term trend analysis without storing any of the data.
|
By Coralogix
This 45-minute product demo provides a demonstration of how Coralogix is disrupting the application monitoring and observability market with our game-changing technology. We're working to redefine the way organizations approach logging in their modern DevOps and CI/CD environments. We are increasing developer productivity (less time searching the logs, more time developing), and saving companies upwards of 60% on the overall cost of data volume storage (due to our underlining architecture).
|
By Coralogix
Widespread adoption of agile methodologies, CI/CD pipelines, distributed architectures, and more have enabled software development to reach a rate and scale that would have seemed unimaginable just a few years ago. Of course, along with the benefits of new methodologies and technologies comes a new set of troubleshooting challenges that need to be addressed as well. In this Panel discussion, we'll cover the new challenges in accelerated pipelines and how to overcome them.
|
By Coralogix
A new generation of troubleshooting techniques are making their way into the mainstream. These techniques make observability more dynamic, configurable, and intuitive. In this webinar, we discussed the importance of these new techniques, how they enable you to solve customer issues faster and increase your velocity.
|
By Coralogix
There are numerous types of logs in AWS, and the more applications and services you run in AWS, the more complex your logging needs are bound to be. Learn how to manage AWS log data that originates from various sources across every layer of the application stack, is varied in format, frequency, and importance.
- April 2026 (4)
- March 2026 (3)
- February 2026 (1)
- January 2026 (1)
- December 2025 (3)
- November 2025 (2)
- August 2025 (1)
- May 2025 (1)
- March 2025 (1)
- January 2025 (1)
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- July 2024 (1)
- May 2024 (2)
- April 2024 (1)
- March 2024 (2)
- February 2024 (3)
- December 2023 (1)
- November 2023 (5)
- September 2023 (1)
- July 2023 (2)
- January 2023 (2)
- December 2022 (1)
- August 2022 (1)
- July 2022 (2)
- June 2022 (2)
- May 2022 (2)
- April 2022 (1)
- March 2022 (6)
- February 2022 (7)
- January 2022 (2)
- December 2021 (1)
- November 2021 (1)
- October 2021 (1)
- September 2021 (1)
- August 2021 (3)
- July 2021 (1)
- June 2021 (3)
- May 2021 (4)
- April 2021 (4)
- March 2021 (2)
- February 2021 (2)
- January 2021 (4)
- December 2020 (1)
- November 2020 (2)
- October 2020 (6)
- July 2020 (2)
- June 2020 (2)
- March 2020 (1)
- February 2020 (1)
- January 2020 (3)
Coralogix helps software companies avoid getting lost in their log data by automatically figuring out their production problems:
- Know when your flows break: Coralogix maps your software flows, automatically detects production problems and delivers pinpoint insights.
- Make your Big Data small: Coralogix’s Loggregation automatically clusters your log data back into its original patterns so you can view hours of data in seconds.
- All your information at a glance: Use Coralogix or our hosted Kibana to query your data, view your live log stream, and define your dashboard widgets for maximum control over your data.
Our machine learning powered platform turns your cluttered log data into a meaningful set of templates and flows. View patterns and trends, and gain valuable insights to stay one step ahead at all times!