Standard Logstash Template for Event Processing (Gold Template) Threats This standard template for configuring Logstash pipelines, commonly referred to… rooter December 10, 2024 3 min read 0
Configuring Disk Allocation Thresholds in Elasticsearch and OpenSearch Threats When running an Elasticsearch or OpenSearch cluster, efficient disk space… rooter December 10, 2024 3 min read 0
Understanding index.mapping.total_fields.limit in OpenSearch/ElasticSearch Threats Sometimes, you can get the associated error Limit of total… rooter December 10, 2024 2 min read 0
UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex Threats Since russia launched its full-scale invasion of Ukraine, defense organizations… rooter December 9, 2024 5 min read 0
Monitoring Elasticsearch Cluster With Metricbeat Threats Monitoring Elasticsearch is crucial for maintaining its performance and ensuring… rooter December 9, 2024 2 min read 0
Understanding indices.query.bool.max_clause_count in OpenSearch Threats The indices.query.bool.max_clause_count setting in OpenSearch specifies the maximum number of clauses allowed… rooter December 9, 2024 2 min read 0
Decoding the PROCTITLE Field in Auditd Event Streams with Logstash Threats By default, the PROCTITLE field contains the command used to start… rooter December 9, 2024 2 min read 0
BlueAlpha Attack Detection: russia-affiliated Hacking Collective Abuses Cloudflare Tunnels to Distribute GammaDrop Malware Threats The russian state-sponsored threat actor BlueAlpha (aka Gamaredon, Hive0051, Shuckworm,… rooter December 6, 2024 3 min read 0
Interesting URL Schema Abuse Patterns (Merry Phishmas) Threats One interesting feature of the specification of the URL schema… rooter December 6, 2024 2 min read 0
Migrating Dashboards Between OpenSearch Instances Threats If you need to migrate visualizations or dashboards from one… rooter December 6, 2024 1 min read 0