Security Blogs

Latest Articles

SSO without an Active Directory or LDAP provider
Security
4 Minute Read

SSO without an Active Directory or LDAP provider

Hackers are already in your environment – spot them with THOR and Splunk!
Security
2 Minute Read

Hackers are already in your environment – spot them with THOR and Splunk!

Random Words on Entropy and DNS
Security
4 Minute Read

Random Words on Entropy and DNS

Detecting dynamic DNS domains in Splunk
Security
3 Minute Read

Detecting dynamic DNS domains in Splunk

While useful legitimately, hackers can use dynamic DNS domains to change IP address rapidly & exploit via malware-evil.duckdns[.]org; how to protect against?
Back from FiRST Berlin, discover CIRCL Passive SSL
Security
2 Minute Read

Back from FiRST Berlin, discover CIRCL Passive SSL

Phishing – What does it look like in machine data?
Security
2 Minute Read

Phishing – What does it look like in machine data?

Phishing hits a new level of quality
Security
2 Minute Read

Phishing hits a new level of quality

Duqu 2.0 – The cyber war continues on a new level
Security
2 Minute Read

Duqu 2.0 – The cyber war continues on a new level

Monitoring and alerting for activities of expired user accounts
Security
2 Minute Read

Monitoring and alerting for activities of expired user accounts