UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex Threats Since russia launched its full-scale invasion of Ukraine, defense organizations… rooter December 9, 2024 5 min read 0
Monitoring Elasticsearch Cluster With Metricbeat Threats Monitoring Elasticsearch is crucial for maintaining its performance and ensuring… rooter December 9, 2024 2 min read 0
Understanding indices.query.bool.max_clause_count in OpenSearch Threats The indices.query.bool.max_clause_count setting in OpenSearch specifies the maximum number of clauses allowed… rooter December 9, 2024 2 min read 0
Decoding the PROCTITLE Field in Auditd Event Streams with Logstash Threats By default, the PROCTITLE field contains the command used to start… rooter December 9, 2024 2 min read 0
BlueAlpha Attack Detection: russia-affiliated Hacking Collective Abuses Cloudflare Tunnels to Distribute GammaDrop Malware Threats The russian state-sponsored threat actor BlueAlpha (aka Gamaredon, Hive0051, Shuckworm,… rooter December 6, 2024 3 min read 0
Interesting URL Schema Abuse Patterns (Merry Phishmas) Threats One interesting feature of the specification of the URL schema… rooter December 6, 2024 2 min read 0
Migrating Dashboards Between OpenSearch Instances Threats If you need to migrate visualizations or dashboards from one… rooter December 6, 2024 1 min read 0
Enhancing Request Handling with Custom Headers in AWS WAF Threats AWS WAF allows you to insert custom headers into HTTP… rooter December 6, 2024 2 min read 0
Generating a CSR and Using an External Certificate with Elasticsearch Threats This guide is aimed at beginners and provides a step-by-step… rooter December 6, 2024 4 min read 0
OpenSearch: How to Fix Security Analytics Error When You Try to Create a New Detector Threats Sometimes, you can encounter an error shown at the bottom… rooter December 6, 2024 1 min read 0