UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware Threats The UAC-0099 hacking collective, which has been launching targeted cyber-espionage… rooter December 16, 2024 5 min read 0
How to Deal with the Warning: “No ‘Basic Authorization’ header, send 401 and ‘WWW-Authenticate Basic’” Threats If you’ve worked with OpenSearch or Elasticsearch and encountered "No… rooter December 16, 2024 2 min read 0
Fluentd: How to Make Nested Hash from Dot-Separated Keys Threats When a log record has keys like test.test, you can… rooter December 16, 2024 2 min read 0
Essential Dev Tools Commands for Elasticsearch & OpenSearch Administrators Threats As an Elasticsearch administrator, using the Dev Tools Console in… rooter December 16, 2024 3 min read 0
How to Increase index.max_regex_length in OpenSearch Threats The error index.max.regex_length in OpenSearch is related to the maximum length of… rooter December 16, 2024 2 min read 0
Secret Blizzard Attack Detection: The russia-Linked APT Group Targets Ukraine via Amadey Malware to Deploy the Updated Kazuar Backdoor Version Threats Hot on the heels of russia-linked BlueAlpha’s exploitation of Cloudflare… rooter December 13, 2024 5 min read 0
Fluentd: How to Change Tags During Log Processing. Threats I have a case where I need to drop unnecessary… rooter December 13, 2024 3 min read 0
IBM QRadar: How to Create a Rule for Log Source Monitoring Threats Create a Custom RuleYou can create a custom rule to… rooter December 13, 2024 2 min read 0
Using Roles and Users for Data Access in Elasticsearch Threats Elasticsearch uses a security model to control access to data… rooter December 13, 2024 4 min read 0
CVE-2024-50623 Detection: Attackers Actively Exploit a RCE Vulnerability in Cleo Harmony, VLTrader, and LexiCom File Transfer Products Threats High-profile attacks often stem from the exploitation of RCE vulnerabilities… rooter December 12, 2024 3 min read 0