Home / Blog / All Blog Posts

Alert Logic Blogs 

Microsoft Exchange Attack: How Alert Logic Identified and Responded to the HAFNIUM hack

Microsoft Exchange Attack: How Alert Logic Identified and Responded to the HAFNIUM hack

On the heels of the infamous breaches earlier this year, another breach dominates the headlines, the HAFNIUM led attack that affects on-prem versions of Microsoft Exchange. Fortunately, Microsoft has been aggressively moving customers from on-prem Office and Exchange to O365 and Exchange online. However, with every technology transition (much like public cloud adoption) each organization moves at their own pace.

What is Private Cloud?

What is Private Cloud?

Learn about the private cloud, its benefits and drawbacks, and how it may be a better choice for your organization.

What is Public Cloud?

What is Public Cloud?

Discover what a public cloud is, how it works, and its key benefits in this insightful blog from Alert Logic. Learn about security considerations, cost efficiency, and scalability in public cloud computing.

A Team That’s Built to Last

A Team That’s Built to Last

As an unprecedented winter storm wreaked havoc across Texas, the Alert Logic SOC stepped up to the plate to make sure that our customers never went unprotected for a single moment.

The Top 5 Cybersecurity Threats to Watch Out for in 2022

The Top 5 Cybersecurity Threats to Watch Out for in 2022

An unprecedented number of new challenges to cybersecurity were created in 2020 as the COVID-19 pandemic forced an unprecedented number of businesses out of the office to operate strictly online. This fueled a fertile environment for malicious actors to seek profit and sow chaos.

Avoiding Cyber Illnesses while Improving the Health of Your Security Portfolio

Avoiding Cyber Illnesses while Improving the Health of Your Security Portfolio

There are many parallels between cybersecurity and healthcare. Some are as simple as shared terminology — virus, infection, containment, etc. — while others are as complex as the architecture and epidemiology of each.

Just as hospitals and doctors stay informed about new illnesses, treatment recommendations, and preventative care, so must security professionals stay on top of new and emerging threats, optimal responses to cyberattacks, and preventative measures to avoid successful attacks.

Securing Web Applications with Comprehensive Threat Detection

Securing Web Applications with Comprehensive Threat Detection

Web applications are everywhere. In many ways, particularly in today’s world of remote work, they are the cornerstone of daily business operations. However, web apps are the most frequently attacked assets in an IT environment and present some of the greatest security challenges. So, how do you go about addressing the risk? Let’s explore the solutions.

Four Questions to Consider when Building a Security Platform

Four Questions to Consider when Building a Security Platform

Cybersecurity is more complex than ever before. Threats grow increasingly sophisticated, with cybercriminals employing automation to scale up the number and frequency of their attacks. These attacks often unfold in phases over weeks making them harder to detect. At the same time, multiplex IT environments are making it tougher for companies to maintain organizational control of their networks.

SLOTHFULMEDIA Remote Access Trojan

SLOTHFULMEDIA Remote Access Trojan

At the start of October 2020, CISA released a report detailing a new RAT known as SLOTHFULMEDIA deployed by a sophisticated threat actor. The report contains some technical analysis and indicators of compromise.

Innovating for Outcomes with Customer Obsession as the Driver

Innovating for Outcomes with Customer Obsession as the Driver

As a SaaS-enabled cybersecurity company, we are always on the threat hunt and innovation trail. We thrive on delivering increasingly more value to our customers and elevating their Alert Logic experience. As Albert Einstein once wisely implored: “You can’t solve a...

Cloud Transformation is a Marathon, not a Sprint

Cloud Transformation is a Marathon, not a Sprint

We recently wrapped up our cloud transformation webinar series by discussing how maintaining security at the core of your transformation enables growth, scale, and expansion of your business. This post expands on that discussion, offering a look into the shift to...

Ready to Protect Your Company with Alert Logic?