NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System Threats The modern-day cyber threat landscape is marked by the rise… rooter January 6, 2025 4 min read 0
Elasticsearch: Cluster Status is RED Threats It happens very rarely, but sometimes your cluster gets red… rooter January 3, 2025 1 min read 0
Search and Replace Text in SPL Fields with rex Threats Sometimes when working with fields in SPL, it can be… rooter January 2, 2025 1 min read 0
CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers Threats In 2024, vulnerability exploitation accounted for 14% of breach entry… rooter January 2, 2025 4 min read 0
rare Сommand in Splunk Threats The rare command in Splunk helps you find the least common values… rooter December 30, 2024 1 min read 0
coalesce Function in Splunk Threats The Splunk coalesce function returns the first non-null value among its arguments.… rooter December 30, 2024 1 min read 0
Strela Stealer Attack Detection: New Malware Variant Now Targets Ukraine Alongside Spain, Italy, and Germany Threats Security experts have uncovered a novel Strela Stealer campaign, which… rooter December 27, 2024 4 min read 0
Reducing Kafka Lag: Optimizing Kafka Performance Threats Apache Kafka is a powerful distributed messaging system, but like… rooter December 27, 2024 4 min read 0
KRaft: Apache Kafka Without ZooKeeper Threats Apache Kafka has been a cornerstone of modern event streaming… rooter December 27, 2024 2 min read 0
Using Kafka as a Fast Correlation Engine Threats In this article, we explore how Kafka Streams can be… rooter December 23, 2024 5 min read 0