New blog post coming tomorrow (Thursday). After the success and almost viral post about Atomic Red Team, it’s time to use histograms to analyse data and find repetition and silence.

Here’s the Atomic Red Team post:
https://threathunter-chronicles.medium.com/logwatchers-zenit-02-simulating-attacks-with-atomic-red-team-d9071d42eaeb

#cybersecurity #threathunting #threatdetection #loganalysis #incidentresponse #mvpbuzz #blog

Logwatcher’s Zenit #02: Simulating Attacks with Atomic Red Team

At the summit of signal and noise lies the Logwatcher’s Zenit — a quiet place for analysts who squint at timestamps and whisper to correlation engines. Bring your coffee, leave your assumptions at…

Medium
Log Analysis Made Easy: The Swiss Army Knife for Logs – Logtap

LogTap is a versatile log analysis tool, allowing users to clean, scan, and run rule detection within their browser. It utilizes SuperSQL queries and visualization features to streamline anomaly tr…

ShinkenSec

As cybersecurity professionals, log analysis is one of our most powerful tools in the fight against threats

Read more 👉 https://lttr.ai/AeClJ

#Security #Infosec #LogAnalysis

How to Craft Effective Prompts for Threat Detection and Log Analysis

Tweet   Introduction As cybersecurity professionals, log analysis is one of our most powerful tools in the fight against threats. By sifting through the vast troves of data generated by our systems, we can uncover the telltale signs of malicious … Continue reading →

MSI :: State of Security

Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! 🕺 🎉 So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.

Learn about:
🤔 What regex means
❓ What a regex function is used for
🖊️ Writing a regular expression
✔️ Using regular expressions
💪 Getting the most from your logs

https://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec

Getting Ready with Regex 101

Regex, short for regular expressions, is a syntax used to define search patterns when matching and manipulating strings. Let's look at it!

Graylog

Let's take a look at extracting data from #Graylog. Follow along as Tony Reinke shows you step-by-step how to transform your raw data from unstructured to structured.

We can find logs with raw text searches, but to gain insights in to the data we need to extract the different fields and their values, which will in turn make search easier and assist you in the creation of dashboards and alerts. 👍

Ready to dive in? 🪂

https://medium.com/@coachreinke/graylog-extracting-data-5733a8416c81 #logmanagement #loganalysis #logdata #cybersecurity

Graylog: Extracting Data - Tony Reinke - Medium

What we have accomplished: 1. Stood up a stand-alone Graylog instance in Docker 2. Configured Pi-Hole to send data to Graylog 3. Configured the Pi-Hole logs to move into a unique index In this story…

Medium
Efficient DataLib Log Retrieval: A C++ Implementation
Efficient DataLib Log Retrieval in C++: Optimize your log analysis process, minimizing resource use & maximizing performance. Learn techniques for querying & analyzing DataLib logs. #DataLib #C++ #LogRetrieval #DatabaseLogs #DB2 #LogAnalysis
https://tech-champion.com/database/db2luw/efficient-datalib-log-retrieval-a-c-implementation/

⏰ It's time to talk about #Kubernetes + logging. Need a primer on the topic? Drop on in for this Kubernetes 101 overview! 👩‍🏫 👇

Find out about:
❓ What Kubernetes is and why it's used
🗣️ The Kubernetes vocabulary
⚙️ How Kubernetes works
📈 The benefits of Kubernetes
💯 Best practices for Kubernetes logging

Plus, learn how you can integrate Kubernetes monitoring and security into your overarching monitoring strategy.

https://graylog.org/post/kubernetes-101/ #APIsecurity #loganalysis

Kubernetes 101

Understanding how the Kubernetes control plane improves container management and security can help you implement more robust monitoring.

Graylog

Need a reference guide for the Syslog protocol? 📑 #Graylog's Jeff Darrington's got you covered! 🙌

Check out this guide which covers:
▪️ RFC 3164 (BSD Syslog Protocol)
▪️ RFC 5424 (Structured Syslog Protocol)
▪️ RFC 3195 (Reliable Delivery for Syslog)
▪️ RFC 6587 (Syslog over TCP)
▪️ Syslog Kafka (formatted as per RFC 3164 or RFC 5424)
▪️ Syslog AMQP (Advanced Message Queuing Protocol)
▪️ Syslog TCP/UDP (Multiline format)

#Syslog is a logging protocol that is supported across many applications as well as hardware, and despite having been developed in the 1980s is still a very common format in use today. Many newer logging formats have come out over the years, but Syslog will still be with us for quite some time.

https://graylog.org/post/syslog-protocol-a-reference-guide/ #logmanagement #loganalysis #cybersecurity

Syslog Protocol: A Reference Guide

Follow this guide Syslog Protocol: A Reference Guide and you will have enough information to understand the differences and nuances of Syslog.

Graylog

The topic of the day today is: data normalization.💥 What is data normalization ❓ We're glad you asked! Data normalization organizes log information into a structured format, making it easier to analyze and interpret. And, if you understand how to apply these principles to log data, then you can more effectively and efficiently monitor your environment for abnormal activity. 🔍 🙌

Learn about the 5 rules of data normalization, what the normalization process looks like for log data, challenges that can come up when normalizing log file data, the benefits to doing this, and more. 👇

https://graylog.org/post/the-importance-of-data-normalization-for-log-files/ #logmanagement #loganalysis #SIEM #cybersecurity

The Importance of Data Normalization for Log Files

Data normalization is the process of creating a common format across dataset values. By normalizing log data, security teams can improve security with custom dashboards, high-fidelity alerts, and data enrichment like with threat intelligence feeds.

Graylog

One common indicator of potential compromise is unusual login activity.

Read more 👉 https://lttr.ai/Aaz2b

#Security #Infosec #LogAnalysis

How to Craft Effective Prompts for Threat Detection and Log Analysis

Tweet   Introduction As cybersecurity professionals, log analysis is one of our most powerful tools in the fight against threats. By sifting through the vast troves of data generated by our systems, we can uncover the telltale signs of malicious … Continue reading →

MSI :: State of Security