PinnedPublished inCoinmonksA COVID Vaccination Passport Scheme Based on IOTADo you remember what it was like to be able to travel freely overseas to any country? Unfortunately a little thing called COVID-19 has put…May 21, 2021May 21, 2021
PinnedWhat is a LOLBIN?To me, the phrase ‘Attackers Living off the Land’ evokes imagery of a foreign army sacking and plundering the countryside. Like Attila the…Jan 18, 2021Jan 18, 2021
PinnedWhat to do if you find a dodgy file, and don't know what to do!Found a suspicious file that you think could be malware, but you don't know what to do? Read on!Jan 9, 2021Jan 9, 2021
PinnedTracking Malware and Threat Actor Activity with Process MonitoringPart 2: How to Enable Process Creation Events and How they can Track Malware and Threat Actor ActivityJan 7, 2021Jan 7, 2021
Introducing LogRhythm.ToolsLogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm…May 28, 2021May 28, 2021
Published inCoinmonksMonitoring a Blockchain with a SIEMIn this article, I will explore the possibility of monitoring a blockchain network with a traditional SIEM tool. But first, some…May 27, 2021May 27, 2021
6 Steps to Using the LogRhythm APIThis article will show you how to use the LogRhythm SIEM API. It is important to understand what the API can do and how you can use it…May 26, 2021May 26, 2021
A Guided Threat Hunting Expedition with LogRhythm CloudAIThreat hunting is a great way of uncovering cyber-attacks or malicious activity within your environment which would otherwise have gone…Apr 29, 2021Apr 29, 2021
How to Hunt for Credential Misuse with a SIEMCredential Misuse is a risky but common practice. Such as when someone uses their domain credentials to run a service or a script. This is…Jan 9, 2021Jan 9, 2021
Tracking Malware and Threat Actor Activity with Process MonitoringPart 3: Centralising Process Creation Events with a SIEMJan 7, 2021Jan 7, 2021