LogRhythm dashboard showing risk based prioritization and possible DDoS detected

Telecommunication Security Use Cases

| | LogRhythm Labs
Attacks made against telcos and internet service providers (ISPs) have steadily risen. Distributed denial of service (DDoS) attackers launched an 11-day attack against a Chinese telco in 2017 — breaking the DDoS record that year. That same year, Kaspersky Lab… The post Telecommunication Security Use Cases appeared first on LogRhythm ... Read More
Operational technology and ICS graphic

What is ICS Security? How to Defend Against Attacks

| | Security Tips and Tricks
Industrial control systems (ICS) play a fundamental role in monitoring complex industrial processes and infrastructure. Proper ICS security is critical, as these systems often face malicious threats and cyberattacks. The National Institute of Standards and Technology (NIST) explains the importance… The post What is ICS Security? How to Defend Against ... Read More
How to detect prohibited interconnect packets with LogRhythm

How to Detect and Respond to SS7 Attacks — OT Telco Use Cases

| | LogRhythm Labs
In the telecom environment, using Signaling System No.7 (SS7) protocol is very crucial, especially in 2G networks. If you’re wondering how SS7 works, SS7 protocol is an international telecommunications standard used to set up public switched telephone network (PSTN) and… The post How to Detect and Respond to SS7 Attacks ... Read More
Figure 1: A basic search within LogRhythm for authentication logs

Detecting Hard-Coded Credentials with LogRhythm

| | Security Tips and Tricks
Hard-coded is a term used to describe when a software developer embeds data directly into the source code of a program or script, rather than supplying it externally as a parameter. If the data consists of user credentials, this can… The post Detecting Hard-Coded Credentials with LogRhythm appeared first on ... Read More