Graylog
@graylog2
Followers
9K
Following
4K
Media
1K
Statuses
5K
๐ Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement
Houston, TX / Hamburg, Germany
Joined August 2010
Good log management is about managing your reports in the most efficient way possible. To do that you need: โ๏ธA comprehensive log management & collection function โ๏ธCentralized log monitoring & analysis โ๏ธData pipeline management โ๏ธAlerts & notifications https://t.co/QWnBu5BVe1
graylog.org
Discover essential log management features like real-time monitoring, alerts, and dashboards to enhance security and compliance.
0
0
5
We had an awesome time last week in Charleston, SC at our company gathering! ๐ From morning jogs, to volunteering + giving back to the community, to productive meetings (hello "Sheloggers") & more. We're pumped & ready for 2025.๐ช Let's go!๐ #cybersecurity #APIsecurity #SIEM
0
0
6
Great discussion about innovation in cyber tech!๐ก @BillKerschbaum & #Graylog's Seth Goldhammer discuss why innovation is necessary, pressure on cyber tech companies to push innovation to the next level, the different inputs that go into a product, +more. https://t.co/igqSgg7K4Y
open.spotify.com
The Cyber Biz Speakeasy ยท Episode
0
2
6
It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC.๐ One highlight was our awards ceremony where we honored some particularly impactful team members.๐ Congrats on some amazing achievements & thank you for being such great roll models! ๐
0
1
4
๐ A new flaw (CVE-2024-7344) in UEFI systems has been discovered, letting attackers run unsigned code during system bootโeven with Secure Boot enabled. Read more โก๏ธ
thehackernews.com
UEFI vulnerability CVE-2024-7344 allows unsigned code execution in Secure Boot systems. Microsoft revokes binaries; vendors issue patches.
0
109
194
Emerging FunkSec Ransomware Developed Using AI
securityweek.com
Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024.
0
3
2
๐ด Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited. โคท CVE-2025-21333 โคท CVE-2025-21334 โคท CVE-2025-21335 Patch now:
thehackernews.com
Microsoftโs January 2025 update addresses 161 vulnerabilities, including 3 zero-days and 5 critical flaws.
4
213
442
Let's talk about your DNS infrastructure and its #security.๐๐ This is the translator for cloud-based operations for continued services, and it's important to make sure that it's secure. Take a look at 6 DNS #cyberattack types and how to prevent them.๐
graylog.org
Mitigating Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack risks starts with understanding DNS security best practices for logging and monitoring.
0
1
3
๐ New macOS flaw (CVE-2024-44243) discovered! Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system. Explore the details:
thehackernews.com
CVE-2024-44243 flaw in macOS SIP allowed root-level exploits, risking persistent malware and reduced system reliability.
0
81
138
Ready to be crowned "Most Innovative Startup 2025"? Submissions for the #RSAC Innovation Sandbox contest open TODAY, and close February 14. This year, the Top 10 Finalists will receive a $5 million uncapped SAFE investment. Learn more here: https://t.co/qgYDnl5ETY
0
1
1
Security #datalakes & #datawarehouses are repositories that enable orgs to store large amounts of #security #data. Is it time for your org to build a security #datalake strategy? ๐๏ธ Let's explore some important details about security data management. ๐
graylog.org
With a security data lake strategy, organizations can realize benefits faster and significantly reduce their total cost of ownership.
0
1
2
Many orgs who use #Graylog are logging sensitive data with #PII, health data, or financial data. So, to ensure compliance with #dataprivacy laws this info must be redacted. Here's a simple way to process pipelines & scrub PII from log messages when needed.
graylog.org
To be compliant with the data privacy act, redacting message fields for privacy is a very important. Here's your howto in Graylog!
0
1
2
If youโre at #shmoocon and happen to see someone with a BTV backpack, come say hi and get some swag! Limited quantities available.
0
4
19
๐จ China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks. โคท New tactic: Using Cloudflare CDN to mask malicious traffic โคท Spyware deployed: Custom PlugX backdoor Read:
thehackernews.com
RedDelta exploited PlugX backdoor and Cloudflare CDN to target Asian governments, including Mongolia's Ministry of Defense, in 2024.
1
37
86
"Expect a Darwinian consolidation in the #security software industry next year & beyond..." says #Graylog's @AndyGrolnick. And, what about the #AI hype cycle of 2024? Are we in for more of the same? Plus, will the good guys overtake the bad guys?๐ฆธโโ๏ธ๐ ๐ค๐ https://t.co/oN69baGBDu
securityboulevard.com
What to expect in 2025 and beyond, into the future. Here are some likely predictions across cybersecurity, GenAI and innovation, and defensive cyber.
0
0
0
We're on the list!๐๐ #Graylog has been included in @BuiltIn's 50 Best Midsized Places To Work For In #Houston, 2025 & 100 Best Places To Work For In Houston, 2025. Congrats to the entire Graylog team!๐ ๐See where we ranked: https://t.co/ZThupYGTTV
#BPTW2025 #2025BuiltInBest
0
1
0
IP address data is useful for many #cybersecurity functions. It can identify a userโs devices or prevent potentially harmful incoming communications by using a known malicious range. Learn how IP lookup data can improve your cybersecurity, and more. https://t.co/v6gJsNqBz3
graylog.org
IP lookup data provides details about web traffic, including geographic location, ISP and operating system to help improve security controls and threat detections.
0
1
2
Aiming for 100% patching of even critical/high severity vulnerabilities can feel like chasing the wind.๐ฌ๏ธ๐ So, what should #cybersecurity pros do? They should focus on what matters! Here's how you can get help with prioritizing all of those those #CVEs.โคต๏ธ
graylog.org
Patching critical systems is always the fix for eliminating vulnerabilities. Or Is it? A focus on what matters and the priorities is best.
0
3
5
What might the future hold when it comes to the role of #datalakes in #SIEM? In this @SecInfoWatch article #Graylog's @JoshuaZiel explains what orgs need to know when it comes to how data & data storage affect cost & the impact on their #cybersec strategy.
securityinfowatch.com
How behavior changes based on economics could hold the key to greater preparedness.
0
1
1