Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Use Cases: Automating Security for Comprehensive ProtectionKnowing how to apply the analytical power of your security tool is key to achieving full visibility and efficiency. The flexibility of mission-critical tools like a Security Information and Event Management (SIEM) allows for unparalleled log manageme...Stellar cyber
Stellar Cyberstellarcyber.hashnode.dev·Feb 17, 2024The Great Leap Forward: The Stellar Cyber Product Update March 2023 EditionAs the majority of the US gets set to “leap forward” this weekend, moving the clocks one hour ahead in the wee hours of Sunday morning, I thought now would be a good time to reflect on how we have been spending our time over here in Stellar Cyber wor...Stellar cyber
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024Stellar Cyber: Log4j Vulnerability and Exploitation Detection1. Introduction In the past several days, a serious Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) has nearly led to a perfect storm in the Internet world. As a widely used Java logging utility with an easily exploitable vulnerability, Log4j ha...Stellar cyber
Stellar Cyberstellarcyber.hashnode.dev·Feb 15, 2024The Case for Open XDR – X Means EverythingThe current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each securit...Open XDR