Logz.io is one of Logz.io’s biggest customers. To handle the scale our customers demand, we must operate a high scale 24-7 environment with attention to performance and security. To accomplish this, we ingest large volumes of data into our service. As we continue to add new features and build out our new machine learning capabilities, we’ve incorporated new services and … [Read more...] about How Logz.io Uses Observability Tools for MLOps
Tools
Researchers Detail Malicious Tools Used by Cyberespionage Group Earth Aughisky
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by an advanced persistent threat (APT) group named Earth Aughisky. "Over the last decade, the group has continued to make adjustments in the tools and malware deployments on specific targets located in Taiwan and, more recently, Japan," Trend Micro disclosed in a technical … [Read more...] about Researchers Detail Malicious Tools Used by Cyberespionage Group Earth Aughisky
T-Mobile Admits Lapsus$ Hackers Gained Access to its Internal Tools and Source Code
Telecom company T-Mobile on Friday confirmed that it was the victim of a security breach in March after the LAPSUS$ mercenary gang managed to gain access to its networks. The acknowledgment came after investigative journalist Brian Krebs shared internal chats belonging to the core members of the group indicating that LAPSUS$ breached the company several times in March prior to … [Read more...] about T-Mobile Admits Lapsus$ Hackers Gained Access to its Internal Tools and Source Code
AQUATIC PANDA in Possession of Log4Shell Exploit Tools
Following the Dec. 9, 2021, announcement of the Log4j vulnerability, CVE 2021-44228, CrowdStrike Falcon OverWatch™ has provided customers with unrivaled protection and 24/7/365 vigilance in the face of heightened uncertainty. To OverWatch, Log4Shell is simply the latest vulnerability to exploit — a new access vector among a sea of many others. Adversarial behavior … [Read more...] about AQUATIC PANDA in Possession of Log4Shell Exploit Tools
RedCurl Corporate Espionage Hackers Return With Updated Hacking Tools
A corporate cyber-espionage hacker group has resurfaced after a seven-month hiatus with new intrusions targeting four companies this year, including one of the largest wholesale stores in Russia, while simultaneously making tactical improvements to its toolset in an attempt to thwart analysis. "In every attack, the threat actor demonstrates extensive red teaming skills and the … [Read more...] about RedCurl Corporate Espionage Hackers Return With Updated Hacking Tools
Improve Your Cyber Security Posture by Combining State of the Art Security Tools
Today there are plenty of cybersecurity tools on the market. It is now more important than ever that the tools you decide to use work well together. If they don't, you will not get the complete picture, and you won't be able to analyze the entire system from a holistic perspective. This means that you won't be able to do the right mitigations to improve your security posture. … [Read more...] about Improve Your Cyber Security Posture by Combining State of the Art Security Tools
Talos Tools of the Trade
Cisco Blogs / Security / Threat Research / Talos Tools of the Trade If you’re looking for something to keep you busy while we’re all stuck inside during the holidays, Cisco Talos has a few tools for you you can play with in the coming days and weeks. We recently updated GhIDA to work with the latest version of IDA and we are releasing new features for the … [Read more...] about Talos Tools of the Trade
Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor
A cybercrime group that has previously struck Docker and Kubernetes cloud environments has evolved to repurpose genuine cloud monitoring tools as a backdoor to carry out malicious attacks, according to new research."To our knowledge, this is the first time attackers have been caught using legitimate third party software to target cloud infrastructure," Israeli cybersecurity … [Read more...] about Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor
3 reasons why Cisco Stealthwatch is the Michael Jordan of Network Traffic Analysis tools
The Last Dance, a 10-part docuseries about the historic career of NBA legend, Michael Jordan, came to an end recently. I was glued to my TV watching, and re-watching, these captivating hour-long episodes. It was chock full of uncut, never before seen footage that had sports fans around the world hooked. As a millennial who did not get the privilege of living through the … [Read more...] about 3 reasons why Cisco Stealthwatch is the Michael Jordan of Network Traffic Analysis tools
5 Cybersecurity Tools Every Business Needs to Know
Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats against all technology users.Businesses, in particular, have become prime targets for cybercriminals due to the nature of data and information they process and store. 2018 saw a slew of data breaches targeting large enterprises that resulted … [Read more...] about 5 Cybersecurity Tools Every Business Needs to Know