home.social

#grayloglabs β€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #grayloglabs, aggregated by home.social.

  1. Is your financial institution as safe as it could be from #ransomware and other cyber threats? πŸ€” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 πŸ’°

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸πŸ’ͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.πŸ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  2. Is your financial institution as safe as it could be from #ransomware and other cyber threats? πŸ€” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 πŸ’°

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸πŸ’ͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.πŸ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  3. Is your financial institution as safe as it could be from #ransomware and other cyber threats? πŸ€” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 πŸ’°

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸πŸ’ͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.πŸ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  4. Is your financial institution as safe as it could be from #ransomware and other cyber threats? πŸ€” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 πŸ’°

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸πŸ’ͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.πŸ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  5. Is your financial institution as safe as it could be from #ransomware and other cyber threats? πŸ€” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 πŸ’°

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸πŸ’ͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.πŸ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  6. Let's take a look back today at #Graylog's first-ever Engineering Hackathon! πŸ‘©β€πŸ’» πŸŽ‰ In October, we gave our engineers a full week to build whatever they believed would make #Graylog better. This allowed them to step away from their day-to-day work, explore new ideas, experiment with technologies, and more.

    Some highlights included:
    🌎 Watching new collaborations take place across our teams & different continents
    πŸ’» A project built primarily via vibe coding
    πŸ› οΈ The project "Portal Gun" team turning a 10-year old POC into a dynamic, usable UI element that you can try out in Graylog 7.1 Alpha 1

    Read all about it, in our latest blog by Dev Team Engineering Directors Rob Curtis and Martina Kohn!πŸ‘‡

    graylog.org/post/the-first-gra #Hackathon #CyberSecurity #Devs #GraylogLabs

  7. πŸ’‘It's time to learn about some features and fixes that will make your daily work in #Graylog smoother. πŸ‘ In our most recent blog by the Graylog Development Team, we're highlighting a minor but functional enhancement β€” Graylog time-range stepping.

    To fix manual time-range adjustment limitations we now have two new time range navigation buttons that let you step forward and backward through your logs, one time range at a time. ⬅️ ➑️ Learn more about this feature here: graylog.org/post/sliding-throu

    πŸ“» And, stay tuned for more in this series from Konrad Merz and the rest of the Graylog Development Team! #CyberSecurity #SIEM #APISecurity #GraylogLabs

  8. It's time to tune in for the latest from #GraylogLabs! πŸ“Ί 🎊 Today we're taking about the new Caddy Webserver Content Pack. Say what? No, not #Caddyshack! β›³ 🦫 Caddy Webserver! πŸ–₯️

    This new content pack is going to help you quickly turn raw logs into structured, searchable insights. πŸ”ŽπŸ’‘ πŸ™Œ It's available in Illuminate 6.4 and a Graylog Enterprise or Graylog #Security license, and delivers ready-to-use parsing rules, streams, and dashboards. 🚚

    Read up on:
    ❓ What this pack does
    πŸͺ΅ Getting logs into #Graylog
    🫡 Why you should log Caddy Webserver logs
    πŸ” How this helps you quickly detect anomalies, identify suspicious requests, and feed relevant data directly into your #TDIR workflows

    graylog.org/post/caddy-webserv #cybersecurity #threatdetection #incidentresponse #SIEM

  9. Getting your data from GitLab’s audit logs into #Graylog for centralized analysis is easier than you might think! πŸ€” πŸ˜ƒ Take a look at this two-part guide to learn how. πŸ‘οΈ πŸ‘‡

    This guide covers:
    πŸ‘‰ Prerequisites for setting up the raw HTTP input for GitLab
    πŸ‘‰ Configuring GitLab to stream logs
    πŸ‘‰ Configuring the raw HTTP input
    πŸ‘‰ Requirements for enriching GitLab logs with Illuminate
    πŸ‘‰ Setup Instructions
    And more...

    Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLab’s Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...

    graylog.org/post/bringing-gitl #cybersecurity #logmanagement #loganalysis #GraylogLabs

  10. Getting your data from GitLab’s audit logs into #Graylog for centralized analysis is easier than you might think! πŸ€” πŸ˜ƒ Take a look at this two-part guide to learn how. πŸ‘οΈ πŸ‘‡

    This guide covers:
    πŸ‘‰ Prerequisites for setting up the raw HTTP input for GitLab
    πŸ‘‰ Configuring GitLab to stream logs
    πŸ‘‰ Configuring the raw HTTP input
    πŸ‘‰ Requirements for enriching GitLab logs with Illuminate
    πŸ‘‰ Setup Instructions
    And more...

    Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLab’s Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...

    graylog.org/post/bringing-gitl #cybersecurity #logmanagement #loganalysis #GraylogLabs

  11. Getting your data from GitLab’s audit logs into #Graylog for centralized analysis is easier than you might think! πŸ€” πŸ˜ƒ Take a look at this two-part guide to learn how. πŸ‘οΈ πŸ‘‡

    This guide covers:
    πŸ‘‰ Prerequisites for setting up the raw HTTP input for GitLab
    πŸ‘‰ Configuring GitLab to stream logs
    πŸ‘‰ Configuring the raw HTTP input
    πŸ‘‰ Requirements for enriching GitLab logs with Illuminate
    πŸ‘‰ Setup Instructions
    And more...

    Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLab’s Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...

    graylog.org/post/bringing-gitl #cybersecurity #logmanagement #loganalysis #GraylogLabs

  12. Getting your data from GitLab’s audit logs into #Graylog for centralized analysis is easier than you might think! πŸ€” πŸ˜ƒ Take a look at this two-part guide to learn how. πŸ‘οΈ πŸ‘‡

    This guide covers:
    πŸ‘‰ Prerequisites for setting up the raw HTTP input for GitLab
    πŸ‘‰ Configuring GitLab to stream logs
    πŸ‘‰ Configuring the raw HTTP input
    πŸ‘‰ Requirements for enriching GitLab logs with Illuminate
    πŸ‘‰ Setup Instructions
    And more...

    Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLab’s Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...

    graylog.org/post/bringing-gitl #cybersecurity #logmanagement #loganalysis #GraylogLabs

  13. Getting your data from GitLab’s audit logs into #Graylog for centralized analysis is easier than you might think! πŸ€” πŸ˜ƒ Take a look at this two-part guide to learn how. πŸ‘οΈ πŸ‘‡

    This guide covers:
    πŸ‘‰ Prerequisites for setting up the raw HTTP input for GitLab
    πŸ‘‰ Configuring GitLab to stream logs
    πŸ‘‰ Configuring the raw HTTP input
    πŸ‘‰ Requirements for enriching GitLab logs with Illuminate
    πŸ‘‰ Setup Instructions
    And more...

    Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLab’s Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...

    graylog.org/post/bringing-gitl #cybersecurity #logmanagement #loganalysis #GraylogLabs

  14. Internet speed got you down? πŸ’» 😡 See how #Graylog Professional Services Engineer, Dan McDowell, took his Internet speed challenges into his own hands! πŸ™Œ πŸ‘

    Using data he gathered by running a script every 30 minutes over a few weeks time, he was able to prove that the issue wasn’t with his router but that something was actually wrong on the ISP's end. πŸ‘€ See step-by-step how Dan fixed this challenge (and how you can, too)!

    graylog.info/3QIwXAZ #GraylogLabs #internetspeed

  15. Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πŸ•Ί πŸŽ‰ So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.

    Learn about:
    πŸ€” What regex means
    ❓ What a regex function is used for
    πŸ–ŠοΈ Writing a regular expression
    βœ”οΈ Using regular expressions
    πŸ’ͺ Getting the most from your logs

    graylog.org/post/getting-ready #loganalysis #cybersecurity #infosec

  16. Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πŸ•Ί πŸŽ‰ So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.

    Learn about:
    πŸ€” What regex means
    ❓ What a regex function is used for
    πŸ–ŠοΈ Writing a regular expression
    βœ”οΈ Using regular expressions
    πŸ’ͺ Getting the most from your logs

    graylog.org/post/getting-ready #loganalysis #cybersecurity #infosec

  17. Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πŸ•Ί πŸŽ‰ So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.

    Learn about:
    πŸ€” What regex means
    ❓ What a regex function is used for
    πŸ–ŠοΈ Writing a regular expression
    βœ”οΈ Using regular expressions
    πŸ’ͺ Getting the most from your logs

    graylog.org/post/getting-ready #loganalysis #cybersecurity #infosec

  18. Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πŸ•Ί πŸŽ‰ So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.

    Learn about:
    πŸ€” What regex means
    ❓ What a regex function is used for
    πŸ–ŠοΈ Writing a regular expression
    βœ”οΈ Using regular expressions
    πŸ’ͺ Getting the most from your logs

    graylog.org/post/getting-ready #loganalysis #cybersecurity #infosec

  19. Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πŸ•Ί πŸŽ‰ So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.

    Learn about:
    πŸ€” What regex means
    ❓ What a regex function is used for
    πŸ–ŠοΈ Writing a regular expression
    βœ”οΈ Using regular expressions
    πŸ’ͺ Getting the most from your logs

    graylog.org/post/getting-ready #loganalysis #cybersecurity #infosec