Detecting Threats with Graylog Pipelines - Part 2
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
At Recon InfoSec we have the honor of working with some of the best security operations, incident...
Whether you're on the Defensive or Offensive side of security, it's important to understand how...
The Recon team is excited to announce the launch of SOC X™, the Professional SOC Team World...
The Recon team is thrilled to announce our newest offering, NDR Live Online!
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...
We've been big fans of the Thinkst platform for a while now. We may have mentioned them a time or...
The Recon incident response team recently worked an intrusion case involving a ManageEngine Desktop...
Staying on-top of the latest adversarial methodologies means quickly adjusting to new TTPs and...