5 Crucial Things You Need to Know for AWS re:Invent
If you are new to AWS re:Invent, these 5 tips are crucial for you to make sure you get the most out of the event, and survive to come again another year.
Emerging Threat: Blueimp jQuery-File-Upload Crops Up Again
Alert Logic security researchers share crucial information about an emerging threat affecting jQuery File Upload Plugin in the wild.
Threat Intelligence – Kilences PowerShell Dropper
We share research and insights on Kilences, a powershell dropper that can deliver damaging malicious payloads.
Threat Intelligence — Big Bang Bot Webshell
Alert Logic security researchers share threat intelligence details for a new active webshell threat that is being used as a dropper or precursor for additional malware and exploits.
Attackers Have Compressed and Accelerated the Cyber Killchain
While analyzing data for the Critical Watch Report, Alert Logic researchers determined that attacks have accelerated and compressed the cyber killchain.
4 Benefits of a Security Operations Center
A look at some of the primary reasons most organizations will benefit from working with a third-party Security Operations Center (SOC).
Why SIEM Is a Process, Not a Product
Alert Logic’s Dan Pitman looks at some of the issues organizations face with SIEM (security incident and event management) tools and why the value of a SIEM is a function of how effectively it is managed and maintained.
Apache Struts Vulnerability Exploited in Cryptomining Attack
Discover how an Apache Struts vulnerability is being used in cryptomining attacks. Learn about the risks, attack methods, and best practices for protecting your systems.
How to Prevent Self-Inflicted Cloud Security Threats
The cloud threat landscape is vast, but the reality is that the biggest issues are self-inflicted through poor configuration and security controls.
Emerging Threat: Active Exploit of Apache Struts Remote Code Execution Vulnerability
Researchers have discovered proof-of-concept code for a new Apache Struts remote code execution vulnerability.
Intrusion Detection for Containers Q&A: What’s Next for Alert Logic’s Container Security Initiatives
This blog examines container security and the role of network intrusion detection in a container environment.
Take a Proactive Approach to Security with Threat Hunting
Threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity