Get a Pentest and security assessment of your IT network.

News

5 Often-Overlooked Log Sources

Security teams should consider logging often-overlooked sources that are valuable for threat hunting exercises. Common logs from servers and firewalls are fairly easily ingested and parsed. DNS logs are challenging to work with because of the volume of data and their multi-line format. Cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) dont have consistent logging formats. Database auditing and logging can be a stumbling block, since database administrators often don’t want to enable features that could affect server performance.”]

Source: https://www.csoonline.com/article/3607912/5-often-overlooked-log-sources.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks