Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Adversary Tradecraft: Emulating Mustang Panda's Use of MAVInject in Recent Campaigns

In cybersecurity, the adage “what’s old is new” continues to hold true as attackers resurface longstanding techniques or repurpose them with new twists and adaptations. The popularization of Living Off the Land Binaries (LOLBins) — legitimate, Windows-native tools commonly abused for malicious uses — is a great example of this.

The Hybrid Security Strategy: Balancing On-Prem SIEM With Cloud Flexibility

According to the Exabeam State of Threat Detection, Investigation, and Response Report, global cybersecurity spending is projected to grow from $92 billion in 2022 to over $170 billion by 2027, pushing security teams to invest in solutions that enhance threat detection, investigation, and response (TDIR). Many organizations have relied on on-premises security information and event management (SIEM) solutions for threat monitoring, incident response, and compliance.

Insider Threats and Compromised Devices: How Network Monitoring Uncovers Security Blind Spots

Now more than ever, insider threats and compromised devices pose a significant challenge to organizations. Whether it’s a malicious insider exfiltrating sensitive data or an endpoint infected with advanced malware, these threats are often difficult to detect using conventional security tools. According to the 2023 Cost of Insider Risks Report by Ponemon Institute, insider threats cost organizations an average of $15.4 million per incident, and incidents take an average of 85 days to contain.

Secure your CI/CD pipelines from supply chain attacks with Sumo Logic's Cloud SIEM rules

Supply chain attacks, particularly those targeting continuous integration/continuous delivery (CI/CD) pipelines, are on the rise. It’s easy to think of these attacks as something that only happens to others, but the reality is that your organization is part of the supply chain too. Whether your company develops software for internal use, offers it as part of a service to your customers, or sells it as a product, you’re exposed.

Understanding Cybersecurity for SCADA

Industrial facilities increasingly rely on interconnected systems to improve operations. As they implement these technologies into their legacy environments, they create new cybersecurity risks within previously isolated Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by connecting them to public internet-facing applications.

Hunting with Elastic Security: Detecting credential dumping with ES|QL

In the shadowy depths of your network, whispers grow louder — something isn’t right. Adversaries are on the prowl, targeting the very keys to your kingdom: your credentials. T1003 - OS Credential Dumping is their weapon of choice to steal password hashes and sensitive authentication materials. They quietly harvest secrets to impersonate users, escalate privileges, and move laterally through your environment.

Elastic and Tines team up to offer SOAR and AIOps

Automate your security and observability workflows with Tines Workflow Automation, now available directly from Elastic Elastic and Tines are unveiling an integrated product offering to transform the crucial work of security and observability teams. We’re excited to introduce Tines Workflow Automation, available directly through Elastic.

Build Smarter Threat Detection with Next-Gen SIEM

SOC teams across businesses, industries, and geographies share the same goal: Stop cyberattacks before damage is done. But for those with legacy SIEMs, this is nearly impossible to achieve. Legacy SIEMs demand an overwhelming investment of time, resources, and expertise to set up and maintain.