#grayloglabs β Public Fediverse posts
Live and recent posts from across the Fediverse tagged #grayloglabs, aggregated by home.social.
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? π€ Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. π¦ π°
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! π¦Έπͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.π
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? π€ Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. π¦ π°
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! π¦Έπͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.π
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? π€ Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. π¦ π°
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! π¦Έπͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.π
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? π€ Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. π¦ π°
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! π¦Έπͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.π
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? π€ Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. π¦ π°
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! π¦Έπͺ Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources β to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.π
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Let's take a look back today at #Graylog's first-ever Engineering Hackathon! π©βπ» π In October, we gave our engineers a full week to build whatever they believed would make #Graylog better. This allowed them to step away from their day-to-day work, explore new ideas, experiment with technologies, and more.
Some highlights included:
π Watching new collaborations take place across our teams & different continents
π» A project built primarily via vibe coding
π οΈ The project "Portal Gun" team turning a 10-year old POC into a dynamic, usable UI element that you can try out in Graylog 7.1 Alpha 1Read all about it, in our latest blog by Dev Team Engineering Directors Rob Curtis and Martina Kohn!π
https://graylog.org/post/the-first-graylog-engineering-hackathon/ #Hackathon #CyberSecurity #Devs #GraylogLabs
-
π‘It's time to learn about some features and fixes that will make your daily work in #Graylog smoother. π In our most recent blog by the Graylog Development Team, we're highlighting a minor but functional enhancement β Graylog time-range stepping.
To fix manual time-range adjustment limitations we now have two new time range navigation buttons that let you step forward and backward through your logs, one time range at a time. β¬ οΈ β‘οΈ Learn more about this feature here: https://graylog.org/post/sliding-through-log-time-space/
π» And, stay tuned for more in this series from Konrad Merz and the rest of the Graylog Development Team! #CyberSecurity #SIEM #APISecurity #GraylogLabs
-
It's time to tune in for the latest from #GraylogLabs! πΊ π Today we're taking about the new Caddy Webserver Content Pack. Say what? No, not #Caddyshack! Ⳡ𦫠Caddy Webserver! π₯οΈ
This new content pack is going to help you quickly turn raw logs into structured, searchable insights. ππ‘ π It's available in Illuminate 6.4 and a Graylog Enterprise or Graylog #Security license, and delivers ready-to-use parsing rules, streams, and dashboards. π
Read up on:
β What this pack does
πͺ΅ Getting logs into #Graylog
π«΅ Why you should log Caddy Webserver logs
π How this helps you quickly detect anomalies, identify suspicious requests, and feed relevant data directly into your #TDIR workflowshttps://graylog.org/post/caddy-webserver-data-in-graylog/ #cybersecurity #threatdetection #incidentresponse #SIEM
-
Getting your data from GitLabβs audit logs into #Graylog for centralized analysis is easier than you might think! π€ π Take a look at this two-part guide to learn how. ποΈ π
This guide covers:
π Prerequisites for setting up the raw HTTP input for GitLab
π Configuring GitLab to stream logs
π Configuring the raw HTTP input
π Requirements for enriching GitLab logs with Illuminate
π Setup Instructions
And more...Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLabβs Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...
https://graylog.org/post/bringing-gitlab-logs-into-focus-with-graylog/ #cybersecurity #logmanagement #loganalysis #GraylogLabs
-
Getting your data from GitLabβs audit logs into #Graylog for centralized analysis is easier than you might think! π€ π Take a look at this two-part guide to learn how. ποΈ π
This guide covers:
π Prerequisites for setting up the raw HTTP input for GitLab
π Configuring GitLab to stream logs
π Configuring the raw HTTP input
π Requirements for enriching GitLab logs with Illuminate
π Setup Instructions
And more...Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLabβs Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...
https://graylog.org/post/bringing-gitlab-logs-into-focus-with-graylog/ #cybersecurity #logmanagement #loganalysis #GraylogLabs
-
Getting your data from GitLabβs audit logs into #Graylog for centralized analysis is easier than you might think! π€ π Take a look at this two-part guide to learn how. ποΈ π
This guide covers:
π Prerequisites for setting up the raw HTTP input for GitLab
π Configuring GitLab to stream logs
π Configuring the raw HTTP input
π Requirements for enriching GitLab logs with Illuminate
π Setup Instructions
And more...Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLabβs Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...
https://graylog.org/post/bringing-gitlab-logs-into-focus-with-graylog/ #cybersecurity #logmanagement #loganalysis #GraylogLabs
-
Getting your data from GitLabβs audit logs into #Graylog for centralized analysis is easier than you might think! π€ π Take a look at this two-part guide to learn how. ποΈ π
This guide covers:
π Prerequisites for setting up the raw HTTP input for GitLab
π Configuring GitLab to stream logs
π Configuring the raw HTTP input
π Requirements for enriching GitLab logs with Illuminate
π Setup Instructions
And more...Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLabβs Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...
https://graylog.org/post/bringing-gitlab-logs-into-focus-with-graylog/ #cybersecurity #logmanagement #loganalysis #GraylogLabs
-
Getting your data from GitLabβs audit logs into #Graylog for centralized analysis is easier than you might think! π€ π Take a look at this two-part guide to learn how. ποΈ π
This guide covers:
π Prerequisites for setting up the raw HTTP input for GitLab
π Configuring GitLab to stream logs
π Configuring the raw HTTP input
π Requirements for enriching GitLab logs with Illuminate
π Setup Instructions
And more...Ready to centralize GitLab Logs? Check out the guide to get started with wiring up GitLabβs Audit Event Streaming, and you'll be on your way to visualizing enriched events in a purpose-built dashboard! Let's go...
https://graylog.org/post/bringing-gitlab-logs-into-focus-with-graylog/ #cybersecurity #logmanagement #loganalysis #GraylogLabs
-
Internet speed got you down? π» π΅ See how #Graylog Professional Services Engineer, Dan McDowell, took his Internet speed challenges into his own hands! π π
Using data he gathered by running a script every 30 minutes over a few weeks time, he was able to prove that the issue wasnβt with his router but that something was actually wrong on the ISP's end. π See step-by-step how Dan fixed this challenge (and how you can, too)!
-
Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πΊ π So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.
Learn about:
π€ What regex means
β What a regex function is used for
ποΈ Writing a regular expression
βοΈ Using regular expressions
πͺ Getting the most from your logshttps://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec
-
Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πΊ π So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.
Learn about:
π€ What regex means
β What a regex function is used for
ποΈ Writing a regular expression
βοΈ Using regular expressions
πͺ Getting the most from your logshttps://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec
-
Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πΊ π So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.
Learn about:
π€ What regex means
β What a regex function is used for
ποΈ Writing a regular expression
βοΈ Using regular expressions
πͺ Getting the most from your logshttps://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec
-
Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πΊ π So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.
Learn about:
π€ What regex means
β What a regex function is used for
ποΈ Writing a regular expression
βοΈ Using regular expressions
πͺ Getting the most from your logshttps://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec
-
Hot off the press, and just in time for your leisurely weekend reading we have our latest #GraylogLabs post! πΊ π So let's dive in and discuss regex patterns. Regex is a well-known syntax across various programming languages and having an understanding of what it is and how to use it can help you be more efficient when trying to match patterns or manipulate strings of #data.
Learn about:
π€ What regex means
β What a regex function is used for
ποΈ Writing a regular expression
βοΈ Using regular expressions
πͺ Getting the most from your logshttps://graylog.org/post/getting-ready-with-regex-101/ #loganalysis #cybersecurity #infosec