photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

278
active users

#siem

1 post1 participant0 posts today
Tedi Heriyanto<p>My SIEM-Agnostic Creative Process to Detection Engineering: <a href="https://osintteam.blog/my-siem-agnostic-creative-process-to-detection-engineering-4e401ac60b63" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">osintteam.blog/my-siem-agnosti</span><span class="invisible">c-creative-process-to-detection-engineering-4e401ac60b63</span></a></p><p><a href="https://infosec.exchange/tags/siem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>siem</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detectionengineering</span></a></p>
Paco Hope #resist<p>If anybody out there is working on using <a href="https://infosec.exchange/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a> or <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> to analyze <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> events in AWS, I wonder if you're considering bullshit attacks via event injection. Let me explain. I'm openly musing about something I don't know much about.</p><p>You might be tempted to pipe a lot of EventBridge events into some kind of AI that analyzes them looking for suspicious events. Or you might hook up to CloudWatch log streams and read log entries from, say, your lambda functions looking for suspicious errors and output.</p><p>LLMs are going to be terrible at validating message authenticity. If you have a lambda that is doing something totally innocuous, but you make it <code>print()</code> some JSON that looks just like a GuardDuty finding, that JSON will end up in the lambda function's CloudWatch log stream. Then if you're piping CloudWatch Logs into an LLM, I don't think it will be smart enough to say "wait a minute, why is JSON that looks like a GuardDuty finding being emitted by this lambda function on its stdout?"</p><p>You and I would say "that's really weird. That JSON shouldn't be here in this log stream. Let's go look at what that lambda function is doing and why it's doing that." (Oh, it's Paco and he's just fucking with me) I think an LLM is far more likey to react "<em>Holy shit! there's a really terrible GuardDuty finding!</em> Light up the pagers! Red Alert!"</p><p>Having said this, I'm <strong>not</strong> doing this myself. I don't have any of my <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> logging streaming into any kind of <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>. So maybe it's better than I think it is. But LLMs are notoriously bad at ignoring anything in their input stream. They tend to take it all at face value and treat it all as legit.</p><p>You might even try this with your <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> . Is it smart enough to ignore things that show up in the wrong context? Could you emit the JSON of an AWS security event in, say, a Windows Server Event Log that goes to your SIEM? Would it react as if that was a legit event? If you don't even use AWS, wouldn't it be funny if your SIEM responds to this JSON as if it was a big deal?</p><p>I'm just pondering this, and I'll credit the source: I'm evaluating an internal bedrock-based threat modelling tool and it spit out the phrase "EventBridge Event Injection." I thought "<strong>oh shit</strong> that's a whole class of issues I haven't thought about."</p>
wall-e / Daniel<p>Maybe I'm missing something, but Sysmon is fucking weird:</p><p>- Developed by Microsoft subsidiary since the late 2000s, yet still not properly packaged by Microsoft, no auto-update mechanism or anything <br>- Download from non-microsoft domain linked to from a Microsoft Learn page<br>- Download is a .zip file without any version info<br>- binaries inside contain zero version info<br>- no chronological releases page anywhere to be found<br>- no RSS feed or anything else I could subscribe to, to be alerted when a new version comes out<br>- Deployed to millions of machines world-wide<br>- actively encouraged to install by every major SIEM vendor out there</p><p>How the fuck am I supposed to keep this thing up to date and/or be alerted to security patches after I've rolled out this unversioned binary blob across my whole ecosystem?</p><p><a href="https://ioc.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://ioc.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://ioc.exchange/tags/siem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>siem</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Nagaram<p>Anyone have any suggestions for a <a href="https://hachyderm.io/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> ? I was going to use Graylog, but I'm not married to anything.</p><p>Also thinking I'll give it a whole Terrabyte of storage.</p><p><a href="https://hachyderm.io/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://hachyderm.io/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://hachyderm.io/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://hachyderm.io/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p>
Dag-Rune ZI call it a dancing tree of life<br> <br> It is a classic shot of one of the main entrances to Ta Prohm Temple, but sometimes cliché becomes iconic.<br> <br> The Ta Prohm is somehow most known for its tall trees and solid root system entangled in the buildings structure.<br> <br> But it is also one of the more challenging temples to explore, because the structure itself, the park around it and the entrance gates. The area is so filled with interesting details and unexpected turns and ideas. This is one of the temples worth spending some time studying.<br> <br> Ta Prohm (Khmer: ប្រាសាទតាព្រហ្ម, "Ancestor Brahma") is the modern name of the structure. Originally it was called Rajavihara (Khmer: រាជវិហារ, "royal monastery"). It was built during the reign of Jayavarman VII, the great ruler who is known for Bayon, the final version of Angkor Thom city and other massive social public works like hospitals and safe guesthouses all over the realm.<br> <br> It was a monastery and university, build to honour the kings mother, with the gates honouring his brother and his guru. At the peak of its operation, 12 500 people lived within Ta Phrom temple complex and appx 80 000 lived in villages around it, supporting the institution.<br> <br> <a href="https://en.m.wikipedia.org/wiki/Ta_Prohm" rel="nofollow noopener noreferrer" target="_blank">https://en.m.wikipedia.org/wiki/Ta_Prohm</a><br> <br> <a href="https://pixelfed.social/discover/tags/Angelina?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#Angelina</a> <a href="https://pixelfed.social/discover/tags/moment?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#moment</a>" <a href="https://pixelfed.social/discover/tags/dancing?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#dancing</a> <a href="https://pixelfed.social/discover/tags/tree?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#tree</a> <a href="https://pixelfed.social/discover/tags/life?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#life</a> <a href="https://pixelfed.social/discover/tags/treeoflife?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#treeoflife</a> <a href="https://pixelfed.social/discover/tags/jolie?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#jolie</a> <a href="https://pixelfed.social/discover/tags/siem?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#siem</a> <a href="https://pixelfed.social/discover/tags/reab?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#reab</a> <a href="https://pixelfed.social/discover/tags/siemreap?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#siemreap</a> <a href="https://pixelfed.social/discover/tags/cambodia?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#cambodia</a> <a href="https://pixelfed.social/discover/tags/kampuchea?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#kampuchea</a> <a href="https://pixelfed.social/discover/tags/worldheritage?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#worldheritage</a> <a href="https://pixelfed.social/discover/tags/khmer?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#khmer</a> <a href="https://pixelfed.social/discover/tags/khmerempire?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#khmerempire</a> <a href="https://pixelfed.social/discover/tags/worldculturalheritage?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#worldculturalheritage</a> <a href="https://pixelfed.social/discover/tags/mobilephotography?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#mobilephotography</a> <a href="https://pixelfed.social/discover/tags/2018CE?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#2018CE</a> <a href="https://pixelfed.social/discover/tags/architecture?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#architecture</a> <a href="https://pixelfed.social/discover/tags/angkor?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#angkor</a> <a href="https://pixelfed.social/discover/tags/goldenage?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#goldenage</a> <a href="https://pixelfed.social/discover/tags/taprohm?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#taprohm</a> <a href="https://pixelfed.social/discover/tags/Ta?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#Ta</a> <a href="https://pixelfed.social/discover/tags/Prohm?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#Prohm</a> <a href="https://pixelfed.social/discover/tags/J7?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#J7</a>
Graylog<p>Unmanaged <a href="https://infosec.exchange/tags/APIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIs</span></a> create <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> blindspots. 🕶️ 😧 And, as orgs build out their application ecosystems, the number of APIs integrated into IT environments expands — which can easily overwhelm security teams. ↕️ 👀 😵 </p><p>Enter... API discovery.💥 Let's take a look at:</p><p>❓ What API discover is<br>⚠️ The risks that undocumented and unmanaged APIs pose<br>❗ Why <a href="https://infosec.exchange/tags/API" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>API</span></a> discovery is important<br>🤖 Using automation for API discovery<br>👁️ What to look for in an API discovery tool</p><p><a href="https://graylog.org/post/why-api-discovery-is-critical-to-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">graylog.org/post/why-api-disco</span><span class="invisible">very-is-critical-to-security/</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a></p>
Jan<p>Has anybody already made wazuh agent 4.9 compile on openbsd 7.6 ? Errors (syscheckd) on my system<br><a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/monitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monitoring</span></a> <a href="https://mastodon.bsd.cafe/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a></p>
AndiMann<p>A10: My advice for <a href="https://masto.ai/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> in <a href="https://masto.ai/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> is start experimenting in ‘safe mode’ – e.g. non-prod systems like plan, dev, test, QA (cf. <a href="https://masto.ai/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a>); post-incident review; or prod-adjacent systems like <a href="https://masto.ai/tags/O11Y" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>O11Y</span></a> &amp; <a href="https://masto.ai/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a>. Use findings to build policy &amp; governance. Iterate to build trust. </p><p><a href="https://masto.ai/tags/eWeekChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eWeekChat</span></a></p>
MalwareLab<p>During the <a href="https://infosec.exchange/tags/SharkBytes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharkBytes</span></a> session at <a href="https://infosec.exchange/tags/SharkFest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharkFest</span></a> conference I had an opportunity to present a lightning talk about my pet project called IDS Lab.<br>It is a lab infrastructure deployable as docker containers, which simulates the small company network.</p><p>The IDS Lab consists of web webserver with <a href="https://infosec.exchange/tags/Wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wordpress</span></a>, <a href="https://infosec.exchange/tags/MySQL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MySQL</span></a> database, <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> desktop with RDP, the <a href="https://infosec.exchange/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> VPN for "remote" workers and for connecting another virtual or physical machines into the lab network.<br>This part of infrastructure can be used for attack simulations.</p><p>There are additional components for playing with logs and detections, too: <a href="https://infosec.exchange/tags/Fluentbit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fluentbit</span></a>, <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> and <a href="https://infosec.exchange/tags/OpenObserve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenObserve</span></a> as lightweight SIEM. </p><p>In the <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> we already have preconfgured dashboards for alerts, netflows, web logs and logs from windows machines, if present.</p><p>Using the provided setup script, the whole lab can be up and running in up to 5 minutes. For more info, please check my GitHub repository with the IDS Lab:</p><p><a href="https://github.com/SecurityDungeon/ids-lab/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/SecurityDungeon/ids</span><span class="invisible">-lab/</span></a></p><p><a href="https://infosec.exchange/tags/sf24eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sf24eu</span></a> <a href="https://infosec.exchange/tags/wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireshark</span></a> <span class="h-card" translate="no"><a href="https://ioc.exchange/@wireshark" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wireshark</span></a></span></p>
Paco Hope #resist<p>I had a fabulous <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> typo on a proposal draft today. It's a draft, so no customer saw this. But we proposed to "execute an indecent response simulation." I'm not sure what sorts of indecent responses they planned to simulate, but I have concerns.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a></p>
AndiMann<p>lol @hashicorp throwing shade @splunk &amp; @datadog in the <a href="https://masto.ai/tags/hashiconf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hashiconf</span></a> Day2 <a href="https://masto.ai/tags/SecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecOps</span></a> keynote re: new enhancements to reduce chatty (i.e. costly) <a href="https://masto.ai/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> log data.</p><p>TBF, also excited to namecheck $SPLK re: integrations with <a href="https://masto.ai/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> &amp; <a href="https://masto.ai/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a> providers too. All part of the path to "<a href="https://masto.ai/tags/enterprise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enterprise</span></a> grade".</p>
wetfeet2000<p>Hey infosec network, got a question for you all! Does anyone have hands on experience with AWS Security Lake? How extensible / flexible is it? E.g. Can I modify lambdas to add my own enrichments, or upgrade to OCSF 1.3? Or add my own query engines like Trino? </p><p>I like the idea of replacing the traditional SIEM with a data lake but am scared of the level of abstraction of the actual "AWS Security Lake" product and am wondering if it would be better to build it from scratch with the underlying AWS components.</p><p><a href="https://infosec.exchange/tags/siem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>siem</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
AndiMann<p>"@elastic Accelerates Logs Onboarding with Automatic Import Powered by Search <a href="https://masto.ai/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>"</p><p>Love to see onboarding <a href="https://masto.ai/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a> <a href="https://masto.ai/tags/data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data</span></a> easier - a top 5 decision factor for solutions in <a href="https://masto.ai/tags/O11Y" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>O11Y</span></a>, <a href="https://masto.ai/tags/AIOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIOps</span></a>, <a href="https://masto.ai/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a>, etc!</p><p>Sounds impressive but let's see how it works IRL!</p><p><a href="https://www.silicon.co.uk/press-release/elastic-accelerates-logs-onboarding-with-automatic-import-powered-by-search-ai" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">silicon.co.uk/press-release/el</span><span class="invisible">astic-accelerates-logs-onboarding-with-automatic-import-powered-by-search-ai</span></a></p>
AndiMann<p>"@elastic Accelerates Logs Onboarding with Automatic Import Powered by Search <a href="https://masto.ai/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>"</p><p>Love to see onboarding <a href="https://masto.ai/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a> <a href="https://masto.ai/tags/data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data</span></a> easier - a top 5 decision factor for solutions in <a href="https://masto.ai/tags/O11Y" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>O11Y</span></a>, <a href="https://masto.ai/tags/AIOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIOps</span></a>, <a href="https://masto.ai/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a>, etc!</p><p>Sounds impressive but let's see how it works IRL!</p><p><a href="https://www.silicon.co.uk/press-release/elastic-accelerates-logs-onboarding-with-automatic-import-powered-by-search-ai" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">silicon.co.uk/press-release/el</span><span class="invisible">astic-accelerates-logs-onboarding-with-automatic-import-powered-by-search-ai</span></a></p>
Miguel Afonso Caetano<p><a href="https://tldr.nettime.org/tags/WorkSurveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorkSurveillance</span></a> <a href="https://tldr.nettime.org/tags/Surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Surveillance</span></a> <a href="https://tldr.nettime.org/tags/WageSlavery" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WageSlavery</span></a> <a href="https://tldr.nettime.org/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> <a href="https://tldr.nettime.org/tags/UEBA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEBA</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatDetection</span></a> <a href="https://tldr.nettime.org/tags/BehaviorProfiling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BehaviorProfiling</span></a>: "This case study explores, examines and documents how employers can use software that analyzes extensive personal data on employee behavior and communication for cybersecurity, insider threat detection and compliance purposes. To illustrate wider practices, it investigates software for “security information and event management” (SIEM), “user and entity behavior analytics” (UEBA), insider risk management and communication monitoring from two major vendors. First, it looks into cybersecurity and risk profiling systems offered by Forcepoint, a software vendor that was until recently owned by the US defense giant Raytheon. Second, it investigates in detail how employers can use cybersecurity and risk profiling software sold by Microsoft, whose “Sentinel” and “Purview” systems provide SIEM, UEBA, insider risk management and communication monitoring functionality. Combined, these systems can monitor everything employees do or say, profile their behavior and single them out for further investigation. Similar to predictive policing technologies, they promise not only to detect incidents but to prevent them before they occur. While organizations can use these software systems for legitimate purposes, this study focuses on their potential implications for employees."</p><p><a href="https://crackedlabs.org/en/data-work/publications/securityriskprofiling" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">crackedlabs.org/en/data-work/p</span><span class="invisible">ublications/securityriskprofiling</span></a></p>
Steven Butterworth(UK-IT-GURU)<p>👋 Hello Mastodon!</p><p>I'm Steven Butterworth, aka UKITGURU. I specialise in InfoSec and SIEM technologies (Splunk, Sentinel, Elastic). As a freelancer, I create and deliver SIEM content, working with gov departments and private sectors. Passionate about Data Science, Data Engineering, and data literacy. Avid triathlon enthusiast—never enough bikes! 🚴‍♂️</p><p>Looking forward to connecting!</p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <br><a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> <br><a href="https://infosec.exchange/tags/Splunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Splunk</span></a> <br><a href="https://infosec.exchange/tags/Sentinel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sentinel</span></a> <br><a href="https://infosec.exchange/tags/DataScience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataScience</span></a> <br><a href="https://infosec.exchange/tags/Triathlon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Triathlon</span></a> <br><a href="https://infosec.exchange/tags/Cycling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cycling</span></a></p>
TribesmanJohn 🇦🇺🌏👨🏼‍💻📷<p>Today I learnt MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 encapsulates LDAP Authentication on Windows Domain controllers where a request is made by LDAP(S).</p><p>This is after I have spent years following trusting most of the advice online that it’s an artifact of NTLM authentication and the local security authority (LSA). For the better part of a decade I had assumed these were being generated by legacy windows devices using NTLM, but never working out why there were so many of them.</p><p>It all makes sense now! And now at least I have a better understanding of some of the events I am looking at!</p><p><a href="https://aus.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://aus.social/tags/ldap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ldap</span></a> <a href="https://aus.social/tags/siem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>siem</span></a> <a href="https://aus.social/tags/splunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>splunk</span></a> <a href="https://aus.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Anton Chuvakin<p>"We Love What’s Broken … Yes, This Of Course Means <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a>!" <a href="https://bit.ly/4chFl2Y" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4chFl2Y</span><span class="invisible"></span></a> &lt;- highlights from a fun report about SIEM from CardinalOps!</p>
Anton Chuvakin<p>"One More Time on <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> Telemetry / Log Sources … " <a href="https://bit.ly/3vF1OY1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3vF1OY1</span><span class="invisible"></span></a> &lt;- ok so this has a boring title, but it has some useful info, I promise -)</p>
Anton Chuvakin<p>"Migrate Off That Old <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> Already!" <a href="https://www.googlecloudcommunity.com/gc/Community-Blog/Migrate-Off-That-Old-SIEM-Already/ba-p/705149" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">googlecloudcommunity.com/gc/Co</span><span class="invisible">mmunity-Blog/Migrate-Off-That-Old-SIEM-Already/ba-p/705149</span></a> &lt;- a somewhat fun, modern (hopefully?) take on an old and often painful topic...</p>