The new and improved NetMon UI

What Are Living Off the Land Attacks?

In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the… The post What Are Living Off the Land Attacks? appeared ... Read More
Dataproof Communications logo

Dataproof Uses LogRhythm’s SOC Services to Deliver End-to-End Cyber Resilience in Africa

| | Customers, General
Dataproof Communications is a leading IT Services and Consulting Company specializing in cybersecurity operations, best practices, and technologies. Based in Johannesburg, Dataproof’s mission is to provide first-class cybersecurity solutions to its customers across Africa. It delivers its large base of… The post Dataproof Uses LogRhythm’s SOC Services to Deliver End-to-End ... Read More
Titanium logo

Titanium and LogRhythm: Elevating Visibility into Cybersecurity Risks in Pakistan

| | Customers, General
Titanium stands as the information security division of Pakistan’s leading ISP Cybernet. Established in 1996, Cybernet is a part of the Lakson Group of Companies, specialising in connectivity solutions for enterprise and SMEs. Over the years, the company has expanded… The post Titanium and LogRhythm: Elevating Visibility into Cybersecurity Risks ... Read More

Do More with Security Orchestration, Automation, and Response (SOAR)

| | Security Tips and Tricks
Today, security operations center (SOC) teams face dual challenges of acquiring both the right caliber and quantity of staff. Many organizations are in the early stages of transitioning from a focus primarily on prevention to a greater emphasis on detection… The post Do More with Security Orchestration, Automation, and Response ... Read More
Detecting a Phishing Email: 10 Things to Watch

Detecting a Phishing Email: 10 Things to Watch

As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is well-known that phishing emails frequently serve as the… The post Detecting a Phishing Email: 10 Things to Watch ... Read More

LogRhythm Announces Strategic Expansion of Executive Leadership Team

| | Life at LogRhythm
The company names new CTO, CRO and CISO to drive innovation and growth LogRhythm, the company helping busy and lean security operation teams defend against cyberthreats, has appointed three new members to the executive leadership team. LogRhythm welcomes David Rizzo… The post LogRhythm Announces Strategic Expansion of Executive Leadership Team ... Read More

LogRhythm’s Hackathon Sparks New Innovation

Twice a year, the LogRhythm Research and Development team hosts an internal hackathon event to give our engineers an opportunity to collaborate, share innovative projects, and get awarded for their ideas. Past and present hackathon projects have inspired Product and… The post LogRhythm’s Hackathon Sparks New Innovation appeared first on ... Read More
GPO within Active Directory

PowerShell and Command Line Logging

With exploits, attacks, and hackers using PowerShell more and more, it’s critical to know when powershell.exe is running on a system and what commands run from within it. Windows Security logs can tell you that PowerShell.exe has been created, but… The post PowerShell and Command Line Logging appeared first on ... Read More