Threat Research

The Top Five Benefits of Cloud SIEM, According to Security Experts

An increase in organizations moving to cloud-first strategies is driving the demand for cloud SIEM solutions. The economic and operational benefits enterprises are seeing from moving many of their services to the cloud can also be realized with a SIEM delivered as a software-as-a-service (SaaS). Learn what security experts, including LogRhythm and industry visionaries, consider to be the top five benefits of a SaaS SIEM solution.

Read More

Securing Water Critical Infrastructure: Detecting a Life-Threatening Attack, Part 2

In part 1 of our two-part series on securing water critical infrastructures (CI), we described how a water treatment plant’s operational technology (OT) security team quickly detected, located, and shut down contaminated water pipes during a potential chemical attack on the plant’s water. In part 2, we will describe how the security team can easily create correlated rules to alert to an attack at one of the plant’s remote locations.

Read More

Take a Deep Dive into PlugX Malware

Although there have been several variants over the years, an analysis of the timeline of variants discussed demonstrates the "original" PlugX variant continues to be used today.

Read More