Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity Awareness Month: Hear From Egnyte's Top Experts

October is Cybersecurity Awareness Month in the U.S. – the annual coming together of government and industry leaders to put a greater focus on cybersecurity domestically and abroad. It’s a chance to reflect on what has worked and to evaluate what more needs to be done; and it’s more crucial than ever, given the rising number of threats facing companies of all sizes. Here at Egnyte, cybersecurity is ingrained in what we do and who we are.

The Simply Cyber Report: October 31, 2022

The top cyber news stories you need to know about right now. Microsoft Security Threat Intelligence is reporting on the Raspberry Robin worm, having infected at least 3000 systems across 1000 organizations at time of this report. First reported by Red Canary in September, Raspberry Robin is spread via USB drive (yes this is still a viable attack vector, and very similar to how Stuxnet initially kicked off). It has very similar technical behavior to the FakeUpdates malvertising campaigns.

Importing Logs with CrowdStrike Falcon LogScale Log Collector

For this how-to guide, we’ll walk through how to use the CrowdStrike Falcon LogScale Log Collector to collect and send log events to your CrowdStrike Falcon® LogScale repository. Although the log shipper supports several types of log sources (see the list here), we’ll cover the use case of collecting log events from journald.

How to Complete Your LogScale Observability Strategy with Grafana

CrowdStrike Falcon® LogScale, formerly known as Humio, provides a full range of dashboarding and live query capabilities out of the box. Sometimes, however, you’ll work in an environment where there are other solutions alongside LogScale. For example, let’s say your operations team takes an observability approach that includes metrics scraped by Prometheus, tracing with Jaeger, and dashboard visualizations with Grafana.

A Cautionary Tale of IoT Security

Imagine this… you walk into work; you are the supervisor of an automated automotive production line for one of the largest global car manufacturers. Everyone from the last shift is still there, they are not packing up to go home, in fact, they are panicking. The production line has shut down, nothing is working, and computer screens along the production line display a ransom demand.