Remove DNS Remove Event Remove Threat Detection
article thumbnail

A compelling story

Cisco Security

For example, the security event might involve requests to communicate with an IP address, and the analyst would say, “This IP address belongs to my DNS server, so the traffic is legitimate.” Wait, what is the baseline, and how was it violated in this particular security event?” Annotated security events.

DNS 144
article thumbnail

Stories from the SOC – DNS recon + exfiltration

CyberSecurity Insiders

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. The post Stories from the SOC – DNS recon + exfiltration appeared first on Cybersecurity Insiders.

DNS 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Advanced AlienApps for Akamai ETP and Akamai EAA help streamline threat management

CyberSecurity Insiders

The ETP app is capable of grabbing a range of ETP events—including threat, AUP (Acceptable User Policy), DNS activity, network traffic, and proxy traffic events—and feeding them into the robust USM Anywhere correlation engine for threat detection and enrichment.

article thumbnail

How to Mitigate DDoS Attacks with Log Analytics

CyberSecurity Insiders

Security log analysis is a set of capabilities for capturing application and event data from across the network, then analyzing the data at scale to detect the warning signals of a DDoS attack before critical systems are disrupted. These capabilities accelerate the process of detecting and responding to DDoS attacks in the cloud.

DDOS 144
article thumbnail

Reading the Yoroi Cyber Security Annual Report 2018

Security Affairs

Yoroi Cyber Security Annual Report 2018 – In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure to be the most aggressive and pervasive threat. For this reason, analyzing the last year occurred events would help cyber-security professionals to prevent further attacks during the next few months.

Malware 108
article thumbnail

The Case for Multi-Vendor Security Integrations

Cisco Security

The AlienApp for Cisco Secure Endpoint enables you to automate threat detection and response activities between USM Anywhere and Cisco Secure Endpoint. In addition, it allows you to collect hourly events from Cisco Secure Endpoint through the USM Anywhere Job Scheduler. New Secure Malware Analytics (Threat Grid) Integrations.

Firewall 145
article thumbnail

What Is Log Monitoring? Benefits & Security Use Cases

eSecurity Planet

Log monitoring is the process of analyzing log file data produced by applications, systems and devices to look for anomalous events that could signal cybersecurity, performance or other problems. These security logs document the events and actions, when they happened, and the causes of errors.

Risk 114