Using Ruby Code in Logstash for Translating Text from HEX Threats In Elasticsearch pipelines, you might encounter scenarios where fields contain… rooter December 18, 2024 2 min read 0
Fluentd: Work With Multiple Log Sources Within a Single Instance by Using @label Threats @label is a feature that defines multiple processing pipelines within… rooter December 18, 2024 2 min read 0
DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution Threats Researchers have uncovered a new malicious campaign using voice phishing… rooter December 17, 2024 3 min read 0
Monitoring Index Size Trends in Elasticsearch: Monthly and Daily Statistics Threats Tracking the growth or reduction in index sizes is crucial… rooter December 17, 2024 3 min read 0
Understanding Key OpenSearch Dashboard Logging Settings Threats OpenSearch Dashboards is a powerful tool for visualizing and interacting… rooter December 17, 2024 2 min read 0
JVM GC Monitor Service Overhead: Root Cause and Recommendations Threats Problem Description: The JvmGcMonitorService overhead warnings indicate that the Java Virtual Machine (JVM)… rooter December 17, 2024 3 min read 0
UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware Threats The UAC-0099 hacking collective, which has been launching targeted cyber-espionage… rooter December 16, 2024 5 min read 0
How to Deal with the Warning: “No ‘Basic Authorization’ header, send 401 and ‘WWW-Authenticate Basic’” Threats If you’ve worked with OpenSearch or Elasticsearch and encountered "No… rooter December 16, 2024 2 min read 0
Fluentd: How to Make Nested Hash from Dot-Separated Keys Threats When a log record has keys like test.test, you can… rooter December 16, 2024 2 min read 0
Essential Dev Tools Commands for Elasticsearch & OpenSearch Administrators Threats As an Elasticsearch administrator, using the Dev Tools Console in… rooter December 16, 2024 3 min read 0