graylog2 Profile Banner
Graylog Profile
Graylog

@graylog2

Followers
9K
Following
4K
Media
1K
Statuses
5K

๐ŸŒ Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement

Houston, TX / Hamburg, Germany
Joined August 2010
Don't wanna be here? Send us removal request.
@graylog2
Graylog
11 months
For the latest from #Graylog, please see us on Bluesky! ๐Ÿ‘‰
0
0
4
@graylog2
Graylog
11 months
Good log management is about managing your reports in the most efficient way possible. To do that you need: โ˜‘๏ธA comprehensive log management & collection function โ˜‘๏ธCentralized log monitoring & analysis โ˜‘๏ธData pipeline management โ˜‘๏ธAlerts & notifications https://t.co/QWnBu5BVe1
Tweet card summary image
graylog.org
Discover essential log management features like real-time monitoring, alerts, and dashboards to enhance security and compliance.
0
0
5
@graylog2
Graylog
11 months
We had an awesome time last week in Charleston, SC at our company gathering! ๐ŸŽŠ From morning jogs, to volunteering + giving back to the community, to productive meetings (hello "Sheloggers") & more. We're pumped & ready for 2025.๐Ÿ’ช Let's go!๐Ÿš€ #cybersecurity #APIsecurity #SIEM
0
0
6
@graylog2
Graylog
11 months
Great discussion about innovation in cyber tech!๐Ÿ’ก @BillKerschbaum & #Graylog's Seth Goldhammer discuss why innovation is necessary, pressure on cyber tech companies to push innovation to the next level, the different inputs that go into a product, +more. https://t.co/igqSgg7K4Y
Tweet card summary image
open.spotify.com
The Cyber Biz Speakeasy ยท Episode
0
2
6
@graylog2
Graylog
11 months
It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC.๐ŸŽ‰ One highlight was our awards ceremony where we honored some particularly impactful team members.๐Ÿ‘ Congrats on some amazing achievements & thank you for being such great roll models! ๐Ÿ†
0
1
4
@TheHackersNews
The Hacker News
11 months
๐Ÿ”’ A new flaw (CVE-2024-7344) in UEFI systems has been discovered, letting attackers run unsigned code during system bootโ€”even with Secure Boot enabled. Read more โžก๏ธ
Tweet card summary image
thehackernews.com
UEFI vulnerability CVE-2024-7344 allows unsigned code execution in Secure Boot systems. Microsoft revokes binaries; vendors issue patches.
0
109
194
@TheHackersNews
The Hacker News
11 months
๐Ÿ”ด Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited. โคท CVE-2025-21333 โคท CVE-2025-21334 โคท CVE-2025-21335 Patch now:
Tweet card summary image
thehackernews.com
Microsoftโ€™s January 2025 update addresses 161 vulnerabilities, including 3 zero-days and 5 critical flaws.
4
213
442
@graylog2
Graylog
11 months
Let's talk about your DNS infrastructure and its #security.๐Ÿ”’๐Ÿ‘€ This is the translator for cloud-based operations for continued services, and it's important to make sure that it's secure. Take a look at 6 DNS #cyberattack types and how to prevent them.๐Ÿ™Œ
graylog.org
Mitigating Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack risks starts with understanding DNS security best practices for logging and monitoring.
0
1
3
@TheHackersNews
The Hacker News
11 months
๐Ÿ”“ New macOS flaw (CVE-2024-44243) discovered! Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system. Explore the details:
Tweet card summary image
thehackernews.com
CVE-2024-44243 flaw in macOS SIP allowed root-level exploits, risking persistent malware and reduced system reliability.
0
81
138
@OneRSAC
RSAC
11 months
Ready to be crowned "Most Innovative Startup 2025"? Submissions for the #RSAC Innovation Sandbox contest open TODAY, and close February 14. This year, the Top 10 Finalists will receive a $5 million uncapped SAFE investment. Learn more here: https://t.co/qgYDnl5ETY
0
1
1
@graylog2
Graylog
11 months
Security #datalakes & #datawarehouses are repositories that enable orgs to store large amounts of #security #data. Is it time for your org to build a security #datalake strategy? ๐Ÿ—๏ธ Let's explore some important details about security data management. ๐Ÿ‘€
Tweet card summary image
graylog.org
With a security data lake strategy, organizations can realize benefits faster and significantly reduce their total cost of ownership.
0
1
2
@graylog2
Graylog
11 months
Many orgs who use #Graylog are logging sensitive data with #PII, health data, or financial data. So, to ensure compliance with #dataprivacy laws this info must be redacted. Here's a simple way to process pipelines & scrub PII from log messages when needed.
Tweet card summary image
graylog.org
To be compliant with the data privacy act, redacting message fields for privacy is a very important. Here's your howto in Graylog!
0
1
2
@BlueTeamVillage
Blue Team Village
11 months
If youโ€™re at #shmoocon and happen to see someone with a BTV backpack, come say hi and get some swag! Limited quantities available.
0
4
19
@TheHackersNews
The Hacker News
11 months
๐Ÿšจ China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks. โคท New tactic: Using Cloudflare CDN to mask malicious traffic โคท Spyware deployed: Custom PlugX backdoor Read:
Tweet card summary image
thehackernews.com
RedDelta exploited PlugX backdoor and Cloudflare CDN to target Asian governments, including Mongolia's Ministry of Defense, in 2024.
1
37
86
@graylog2
Graylog
11 months
"Expect a Darwinian consolidation in the #security software industry next year & beyond..." says #Graylog's @AndyGrolnick. And, what about the #AI hype cycle of 2024? Are we in for more of the same? Plus, will the good guys overtake the bad guys?๐Ÿฆธโ€โ™‚๏ธ๐Ÿ˜ˆ ๐Ÿค”๐Ÿ‘‡ https://t.co/oN69baGBDu
Tweet card summary image
securityboulevard.com
What to expect in 2025 and beyond, into the future. Here are some likely predictions across cybersecurity, GenAI and innovation, and defensive cyber.
0
0
0
@graylog2
Graylog
11 months
We're on the list!๐Ÿ“‹๐Ÿ™Œ #Graylog has been included in @BuiltIn's 50 Best Midsized Places To Work For In #Houston, 2025 & 100 Best Places To Work For In Houston, 2025. Congrats to the entire Graylog team!๐ŸŽ‰ ๐Ÿ‘€See where we ranked: https://t.co/ZThupYGTTV #BPTW2025 #2025BuiltInBest
0
1
0
@graylog2
Graylog
11 months
IP address data is useful for many #cybersecurity functions. It can identify a userโ€™s devices or prevent potentially harmful incoming communications by using a known malicious range. Learn how IP lookup data can improve your cybersecurity, and more. https://t.co/v6gJsNqBz3
Tweet card summary image
graylog.org
IP lookup data provides details about web traffic, including geographic location, ISP and operating system to help improve security controls and threat detections.
0
1
2
@graylog2
Graylog
11 months
Aiming for 100% patching of even critical/high severity vulnerabilities can feel like chasing the wind.๐ŸŒฌ๏ธ๐Ÿƒ So, what should #cybersecurity pros do? They should focus on what matters! Here's how you can get help with prioritizing all of those those #CVEs.โคต๏ธ
graylog.org
Patching critical systems is always the fix for eliminating vulnerabilities. Or Is it? A focus on what matters and the priorities is best.
0
3
5
@graylog2
Graylog
11 months
What might the future hold when it comes to the role of #datalakes in #SIEM? In this @SecInfoWatch article #Graylog's @JoshuaZiel explains what orgs need to know when it comes to how data & data storage affect cost & the impact on their #cybersec strategy.
Tweet card summary image
securityinfowatch.com
How behavior changes based on economics could hold the key to greater preparedness.
0
1
1