I would look at CISA’s Logging Made Easy project, which is based on Wazuh and Elastic with Kibana for visualization and dashboards.
- 0 Posts
- 5 Comments
CyberSeeker@discuss.tchncs.deto Games@sh.itjust.works•More than 5 years after launch, Control gets a surprise patch that lets everyone play the Hideo Kojima missionEnglish17·1 month agoYou definitely should bump it up the list, especially if you can handle ray tracing, though the raster lighting is also good.
CyberSeeker@discuss.tchncs.deto Technology@lemmy.world•Thousands of Linux systems infected by stealthy malware since 2021English0·7 months agoShouldn’t be this hard to find out the attack vector.
Buried deep, deep in their writeup:
RocketMQ servers
- CVE-2021-4043 (Polkit)
- CVE-2023-33246
I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.
Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.
CyberSeeker@discuss.tchncs.deto Technology@lemmy.world•The White House wants to 'cryptographically verify' videos of Joe Biden so viewers don't mistake them for AI deepfakesEnglish0·1 year agoDigital signature as a means of non repudiation is exactly the way this should be done. Any official docs or releases should be signed and easily verifiable by any public official.
Sigh, clickbait at its finest, why else would we click