Pushing the Boundaries of AI-Driven Security Operations

The post Pushing the Boundaries of AI-Driven Security Operations appeared first on LogRhythm. - Read more

A New Era for Vigilant CISOs

The post A New Era for Vigilant CISOs appeared first on LogRhythm. - Read more

Strategies to Safeguard the Finance Industry Against Deepfake Onslaught

With the rise of deepfake technology, the financial sector faces a new and growing threat landscape, as malicious actors exploit artificial intelligence (AI)-generated content...

CISO Panel: How Security Teams Are Evolving Their Strategies in 2024

The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have...

5 New Features that Streamline Security and Compliance with LogRhythm Axon

The output of a security and information event management (SIEM) platform is only as good as the data that is feeding into it. “Garbage...

Expand Log Source Collection and Flexibility with LogRhythm 7.17

Behind every LogRhythm product release, our team puts customers at the very core. That’s part of our commitment to you every 90 days. In...

Benefits of JSON Log Source Collection for LogRhythm Customers

When it comes to log sources, LogRhythm recognizes there are limitless options. After all, more than 30,000 Softwares as a Service (SaaS) companies exist...

Latest article

Building an AI-powered defense-in-depth security architecture for serverless microservices

Enterprise customers face an unprecedented security landscape where sophisticated cyber threats use artificial intelligence to identify vulnerabilities, automate attacks, and evade detection...

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. The post...

16th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider...

Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords

Security researchers have challenged end-to-end encryption claims from popular commercial password managers - Read more