Anvilogic
@WeAreAnvilogic
Followers
192
Following
91
Media
173
Statuses
377
Anvilogic's Multi-Data Platform SIEM is used by Enterprise SOC teams to force multiply their ability to detect, investigate, and hunt. #cybersecurity
Palo Alto, CA
Joined September 2019
Despite launching in the turmoil of the COVID-19 pandemic, @WeAreAnvilogic has emerged as a leader in cybersecurity with the industry's first multi-data platform SIEM. Today, the company has secured a $45 million Series C investment, with participation from @FoundationCap. π
0
5
14
Weβre thrilled to announce the close of our $45M Series C funding round! This latest investment, was led by @EvolutionEquity , alongside existing investors @FoundationCap , @Cervin, @Myriad, @p72vc , @outpostvc , @stepstonegroup , and @ Gsquared. π https://t.co/S0SEvnFi5i
anvilogic.com
Anvilogic closes $45M Series C to grow adoption of its AI-based Multi-Data Platform SIEM, enabling enterprise security operations teams to embrace security data lakes.
1
1
6
Security operations has a data problem. Anvilogic has a simple solution. π Tune in to hear how our Multi-Data Platform SIEM is allowing Security Teams to Break Free from SIEM Lock-in, and start using data like the rest of the business. β‘
0
0
2
Meet our new teammate... π€ Torq is teaming up with @WeAreAnvilogic to give security operations teams a new way to detect and remediate threats across industry-leading data platforms. Get the details, here:
torq.io
Explore how to detect and respond to threats with Torq and Anvilogic for enhanced SOC automation and security operations.
0
1
3
π‘Join us next week for our 6th episode of Detection Dispatch! A hands-on investigation of webshells will help you find tune your threat detection skills, and learn something new. πJoin us!
anvilogic.com
The 4.9β
Detection Engineering podcast available on Spotify, Apple Podcasts & YouTube. Community-driven insights on detection & response.
0
0
0
On this week's #ThreatReport: "Cyble uncovers a complex infection chain where the BATLoader malware facilitates the spread of the versatile XWorm malware. " π‘Want to read more? Find more threat reports hereπ https://t.co/3otpGoNyq1
anvilogic.com
Get the latest threat reports and analysis from The Forge by Anvilogic and subscribe to receive updates in your email.
1
0
0
"The Nitrogen malware is impersonating popular software like AnyDesk and WinSCP to target technology and non-profit organizations in North America. " Are you curious to learn more?π§ Click here to dive deeper into this story + many more threat reports:
0
0
0
The power of threat scenarios is combining some essential activity with other threat identifiers to produce a sequence of activities worthy of investigation. Our Forge Team breaks down a simple Linux example here:
anvilogic.com
In security monitoring, the sequencing of atomic-level identifiers is key to threat detection. Discover how simple Linux system activities can be combined into an effective detection strategy.
0
0
0
π From this week's #ThreatReports: "The Russian threat group APT29, also known as Cloaked Ursa, has initiated a new phishing campaign disguising as car sales to deliver malware to pro-Ukrainian diplomats." Sign up for the weekly threat newsletter here βΆ
anvilogic.com
Get the latest threat reports and analysis from The Forge by Anvilogic and subscribe to receive updates in your email.
0
0
0
π‘ Using Splunk? We know that detection creation, lifecycle management, and correlating across alerts can be challenging. Watch this video to see how Anvilogic can be a perfect match for a Splunk team or user and help overcome these challenges. https://t.co/2WcefYPpmq
0
0
0
π New Blog Alert π The power of threat scenarios is combining some essential activity with other threat identifiers to produce a sequence of activities worthy of investigation. Our Forge Team breaks down a simple Linux example in this blog π https://t.co/ox7ye6W2VT
anvilogic.com
In security monitoring, the sequencing of atomic-level identifiers is key to threat detection. Discover how simple Linux system activities can be combined into an effective detection strategy.
0
0
0
We designed our Detection Engineering Dispatch series to help detection engineers fine-tune their skills. Come join us in Analyzing Powershell Scripts with Kevin Zuk on Thursday, July 20th! Sign up here: https://t.co/ovkYKCbOjm
#detectionengineering #threathunting
0
0
1
β οΈ#ThreatReport Alert: Microsoft's Incident Response team has studied the operations of BlackByte 2.0, revealing a systematic five-day intrusion process. Dig deeper into this story hereπ https://t.co/3otpGoNyq1
anvilogic.com
Get the latest threat reports and analysis from The Forge by Anvilogic and subscribe to receive updates in your email.
0
0
0
On this week's #ThreatReport highlights: βThe BlackCat ransomware gang is exploiting search ads to trick users into downloading a malicious version of the WinSCP file transfer application.β Read more hereπ https://t.co/3otpGoNyq1
0
0
0
CVE-2023-34362: Signs of Clop & MOVEit dates back to 2021. Learn more here: https://t.co/pcDZIbuQIJ
0
0
1
Void Rabisu shifts motives for geopolitical opportunities. π Learn more here: https://t.co/oumR0Mxojb
0
0
1
UAC-0006 distributes SmokeLoader backdoor. πͺ On May 29th, 2023, the Ukrainian Computer Emergency Response Team (CERT-UA) received reports of a malicious campaign involving the distribution of the SmokeLoader malware backdoor.Β π» Learn more here: https://t.co/wbvArZKbFI
0
0
1
G20 nations face cyber threats from Chinese APT group. π A Chinese APT group SharpPanda has been observed targeting government entities in the G20 nations. πΌ Read more here: https://t.co/UqudDCKyGL
0
0
0
Watch our video with Karthik Kannan, Founder & CEO of @WeAreAnvilogic, who explains more about how they're helping @SAP automate detection engineering and hunting β‘οΈ https://t.co/rmbzqhfmRx
#ThreatDetection #DataLakes
0
1
1
Earlier intrusions from Volt Typhoon. π Coverage of the Chinese espionage group, Volt Typhoon (aka. BRONZE SILHOUETTE) has expanded based on information from Secureworks Counter Threat Unit (CTU). https://t.co/XdEFOG0RgZ
0
0
0