PinnedDan CrossleyinCoinmonksA COVID Vaccination Passport Scheme Based on IOTADo you remember what it was like to be able to travel freely overseas to any country? Unfortunately a little thing called COVID-19 has put…6 min read·May 21, 2021----
PinnedDan CrossleyWhat is a LOLBIN?To me, the phrase ‘Attackers Living off the Land’ evokes imagery of a foreign army sacking and plundering the countryside. Like Attila the…3 min read·Jan 18, 2021----
PinnedDan CrossleyWhat to do if you find a dodgy file, and don't know what to do!Found a suspicious file that you think could be malware, but you don't know what to do? Read on!11 min read·Jan 9, 2021----
PinnedDan CrossleyTracking Malware and Threat Actor Activity with Process MonitoringPart 2: How to Enable Process Creation Events and How they can Track Malware and Threat Actor Activity12 min read·Jan 7, 2021----
Dan CrossleyIntroducing LogRhythm.ToolsLogRhythm.Tools is a PowerShell framework which acts as a wrapper for the LogRhythm API. This simplifies interactions with the LogRhythm…4 min read·May 28, 2021----
Dan CrossleyinCoinmonksMonitoring a Blockchain with a SIEMIn this article, I will explore the possibility of monitoring a blockchain network with a traditional SIEM tool. But first, some…9 min read·May 27, 2021----
Dan Crossley6 Steps to Using the LogRhythm APIThis article will show you how to use the LogRhythm SIEM API. It is important to understand what the API can do and how you can use it…5 min read·May 26, 2021----
Dan CrossleyA Guided Threat Hunting Expedition with LogRhythm CloudAIThreat hunting is a great way of uncovering cyber-attacks or malicious activity within your environment which would otherwise have gone…5 min read·Apr 29, 2021----
Dan CrossleyHow to Hunt for Credential Misuse with a SIEMCredential Misuse is a risky but common practice. Such as when someone uses their domain credentials to run a service or a script. This is…5 min read·Jan 9, 2021----
Dan CrossleyTracking Malware and Threat Actor Activity with Process MonitoringPart 3: Centralising Process Creation Events with a SIEM5 min read·Jan 7, 2021----