Your Guide to Education Cybersecurity Compliance in Malaysia

| | General
In the digital age, where sensitive information flows seamlessly through the internet, cybersecurity has become a paramount concern for just about every industry around the globe. Educational institutions are no exception to this. In fact, the Microsoft Global Threat Tool… The post Your Guide to Education Cybersecurity Compliance in Malaysia ... Read More
Prevention & Cure: Countermeasures Against Healthcare Cyberattacks

Prevention & Cure: Countermeasures Against Healthcare Cyberattacks

| | Security Spotlight
A recent successful cyberattack on a large technology provider for hospitals and pharmacies in the US has left patients unable to obtain their medication. This attack is a reminder that healthcare cyberattacks are not stopping, and a successful attack will… The post Prevention & Cure: Countermeasures Against Healthcare Cyberattacks appeared ... Read More

LogRhythm Promotes Joanne Wong to Interim Chief Marketing Officer

| | Life at LogRhythm
A pioneer of LogRhythm’s Asia Pacific operations, Joanne Wong’s appointment reinforces LogRhythm’s commitment to employee advancement through strategic internal promotions SINGAPORE, 5 March 2024 – LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into… The post LogRhythm Promotes Joanne Wong to Interim Chief Marketing ... Read More
How Government Agencies Can Defend Against Exfiltration Tactics

How Government Agencies Can Defend Against Exfiltration Tactics

| | Thought Leadership
In the wake of recent cyber attacks targeting governmental agencies, the need for robust cybersecurity measures has never been more pressing. Most recently, the hacking group R00tK1T has been in the spotlight for its sophisticated campaigns against the cybersecurity infrastructure… The post How Government Agencies Can Defend Against Exfiltration Tactics ... Read More
Detecting Volt Typhoon TTPs – Security Spotlight

Detecting Volt Typhoon TTPs – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. Last week, the Cybersecurity and Infrastructure Security Agency (CISA) released a… The post Detecting Volt Typhoon TTPs – Security Spotlight appeared ... Read More

On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?

Security information and event management (SIEM) solutions are essential for organizations of all sizes to monitor their environment for security threats. SIEM solutions gather and scrutinize security logs originating from diverse sources like firewalls, intrusion detection systems, and web servers.… The post On-Prem SIEM vs. Cloud-Native SIEM: Which One Is ... Read More
RDP Hijacking (T1563) — How to Detect Multiple RDP Sessions | Security Spotlight

Remote Desktop Protocol Hijacking – Security Spotlight

| | General
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about Remote Desktop Protocol… The post Remote Desktop Protocol Hijacking – Security Spotlight appeared ... Read More
Disable Windows Event Logging (T1562) | Security Spotlight

Disable Windows Event Logging – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a technique attackers… The post Disable Windows Event Logging – Security Spotlight appeared ... Read More
Detect Domain Name Abuse | Security Spotlight

Detecting Domain Name Abuse – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a cool open-source… The post Detecting Domain Name Abuse – Security Spotlight appeared ... Read More

Log Ingestion 101: Which Logs Should You Be Bringing Into Your SIEM?

| | log management, SIEM
Security Information and Event Management (SIEM) tools are indispensable in an organization’s cybersecurity framework. SIEM tools collect, analyze, and correlate log data from various devices and applications across an organization to identify suspicious activities, enhance overall security posture, and ensure… The post Log Ingestion 101: Which Logs Should You Be ... Read More

Secure Guardrails