Threat Intelligence — Big Bang Bot Webshell
Alert Logic security researchers share threat intelligence details for a new active webshell threat that is being used as a dropper or precursor for additional malware and exploits.
Attackers Have Compressed and Accelerated the Cyber Killchain
While analyzing data for the Critical Watch Report, Alert Logic researchers determined that attacks have accelerated and compressed the cyber killchain.
4 Benefits of a Security Operations Center
A look at some of the primary reasons most organizations will benefit from working with a third-party Security Operations Center (SOC).
Why SIEM Is a Process, Not a Product
Alert Logic’s Dan Pitman looks at some of the issues organizations face with SIEM (security incident and event management) tools and why the value of a SIEM is a function of how effectively it is managed and maintained.
Apache Struts Vulnerability Exploited in New Cryptomining Attack
The Alert Logic Active Watch team digs into the latest Apache Struts vulnerability with a deeper technical analysis and the discovery of a malicious payload.
How to Prevent Self-Inflicted Cloud Security Threats
The cloud threat landscape is vast, but the reality is that the biggest issues are self-inflicted through poor configuration and security controls.
Emerging Threat: Active Exploit of Apache Struts Remote Code Execution Vulnerability
Researchers have discovered proof-of-concept code for a new Apache Struts remote code execution vulnerability.
Intrusion Detection for Containers Q&A: What’s Next for Alert Logic’s Container Security Initiatives
This blog examines container security and the role of network intrusion detection in a container environment.
Take a Proactive Approach to Security with Threat Hunting
Threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity
Intrusion Detection for Containers Q&A
Part 2 of the intrusion detection for containers Q&A series delves into the distinction between host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) and why that matters.
Intrusion Detection for Containers Q&A: A Critical Part of the Container Security Landscape
A Q&A focused on the issues organizations face when it comes to container security and containerized applications.
What You Need to Know about GDPR and the 72-Hour Breach Notification
A look at articles 33 and 34 of the GDPR (General Data Protection Regulation) and how to address the challenge of the 72-hour breach notification requirement.