Detecting OS Credential Dumping done via WDigest – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about OS Credential Dumping… The post Detecting OS Credential Dumping done via WDigest – ... Read More

Monitoring USB Usage with Windows Logs – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about how you can… The post Monitoring USB Usage with Windows Logs – Security ... Read More

Detecting Token Impersonation – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a common method… The post Detecting Token Impersonation – Security Spotlight appeared first ... Read More

How LOLBAS Is Used in MS Process Abuse – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about LOLBAS and highlighting… The post How LOLBAS Is Used in MS Process Abuse ... Read More

Enhance Your Reporting with Grafana – Security Spotlight

| | General
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about enhancing your reporting… The post Enhance Your Reporting with Grafana – Security Spotlight ... Read More

Remote Desktop Protocol Misuse – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about Remote Desktop Protocol… The post Remote Desktop Protocol Misuse – Security Spotlight appeared ... Read More