Detecting OS Credential Dumping done via WDigest – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about OS Credential Dumping… The post Detecting OS Credential Dumping done via WDigest – ... Read More
Monitoring USB Usage with Windows Logs – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how you can… The post Monitoring USB Usage with Windows Logs – Security ... Read More
Detecting Token Impersonation – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a common method… The post Detecting Token Impersonation – Security Spotlight appeared first ... Read More
How LOLBAS Is Used in MS Process Abuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about LOLBAS and highlighting… The post How LOLBAS Is Used in MS Process Abuse ... Read More
Enhance Your Reporting with Grafana – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about enhancing your reporting… The post Enhance Your Reporting with Grafana – Security Spotlight ... Read More
Remote Desktop Protocol Misuse – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about Remote Desktop Protocol… The post Remote Desktop Protocol Misuse – Security Spotlight appeared ... Read More