syslog-ng Store Box Splunk/HEC and Sentinel destinations

syslog-ng Store Box Splunk/HEC and Sentinel destinations

The syslog-ng Store Box (SSB) appliance, built on syslog-ng Premium Edition (PE), offers a user-friendly graphical interface while retaining most of syslog-ng PE’s robust features. A key application of SSB and syslog-ng PE is enhancing the logging infrastructure...
MOST INSIDER DATA LEAKS ARE ACCIDENTAL

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

Data breaches have become increasingly common today. Notably, the most newsworthy breaches are often malicious, involving either ransomware gangs or disgruntled employees seeking revenge. High-profile, large companies targeted by cyberattacks often face ransom demands...
Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Recently, a new backdoor (CVE-2024-3094) was uncovered within the build system of the widely utilized xz-utils ‘liblzma’ data compression library. This backdoor is purportedly aimed at the OpenSSH server but has the capability to affect any application...
A Tale of the Three *ishings: Part 1 – What is Phishing?

A Tale of the Three *ishings: Part 1 – What is Phishing?

Phishing remains and will remain one of the foremost methods used by cyber attackers today. Over the past two decades, the cybersecurity industry has focused extensively on using technology to secure itself, achieving significant advancements in this regard....