The “New” Exabeam: Brand Evolution for our Next Phase of Innovation and Growth

The post The “New” Exabeam: Brand Evolution for our Next Phase of Innovation and Growth appeared first on LogRhythm. - Read more

Pushing the Boundaries of AI-Driven Security Operations

The post Pushing the Boundaries of AI-Driven Security Operations appeared first on LogRhythm. - Read more

A New Era for Vigilant CISOs

The post A New Era for Vigilant CISOs appeared first on LogRhythm. - Read more

Strategies to Safeguard the Finance Industry Against Deepfake Onslaught

With the rise of deepfake technology, the financial sector faces a new and growing threat landscape, as malicious actors exploit artificial intelligence (AI)-generated content...

CISO Panel: How Security Teams Are Evolving Their Strategies in 2024

The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have...

5 New Features that Streamline Security and Compliance with LogRhythm Axon

The output of a security and information event management (SIEM) platform is only as good as the data that is feeding into it. “Garbage...

Expand Log Source Collection and Flexibility with LogRhythm 7.17

Behind every LogRhythm product release, our team puts customers at the very core. That’s part of our commitment to you every 90 days. In...

Benefits of JSON Log Source Collection for LogRhythm Customers

When it comes to log sources, LogRhythm recognizes there are limitless options. After all, more than 30,000 Softwares as a Service (SaaS) companies exist...

Optimizing cloud resource costs with Elastic Observability and Tines

How can cloud engineers optimize resource costs using Elastic Observability and Tines? Follow this step-by-step guide to learn how to integrate Elastic Observability with...

What you need to know about Process Ghosting, a new executable image tampering attack

Several common process tampering attacks exploit the gap between process creation and when security products are notified. Elastic Security detects a variety of such...

Latest article

Chromium: CVE-2026-2319 Race in DevTools

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2024 ) for more information. -...

Substack Breach May Have Leaked Nearly 700,000 User Details Online

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post...

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics - Read more

The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP

I don’t know about you, but when I think about “critical vulnerabilities,” I usually picture ransomware, data theft, or maybe a server falling over...