OpenSSL Vulnerability: What You Should Know
What Happened? A high critical vulnerability (CVE-2022-3786, CVE-2022-3602) was discovered in OpenSSL, a popular open source cryptography library that many applications, operating...
Read MoreProduct Update: Automating Honeypot Security Detections
It’s the time of year when I let our audience know about our honeypot and all of the new amazing features we have to offer! Just to recap: a honeypot is a network device that ...
Read MoreLock Down PowerShell or Else!
Malicious scripts are a key part of every attack and pentest. These malicious scripts are often run in PowerShell (PS) within Windows environments. PowerShell is one of the most po...
Read MoreTop 10 Security Detections of 2020
Blumira wanted to begin the year with a recap of how last year looked regarding the number of detections across our customers' networks. The detections (findings, as we call them a...
Read MoreBlumira’s Security Operations Team Assistance on Integrations
Product integrations can vary based on if the product uses direct Syslog output or an API (application programming interface). In the Blumira platform, we have what we call a Logge...
Read MoreElevate Security Response with Blumira’s Security Operations Team
Blumira’s SIEM and XDR solutions provide thoughtfully crafted automated detections and security recommendations seamlessly integrated into the platform. The incident detection te...
Read MoreWhat You Need to Know About the Severe F5 BIG-IP Vulnerability
A private security researcher named Mikhail Klyuchnikov disclosed a substantial vulnerability relating to F5 Networks’ product BIG-IP over the weekend. F5 BIG-IP LTM uses special...
Read MoreBlumira’s Threat Hunting Playbook
The Blumira security team was recently engaged by an existing Blumira customer to perform a general security integrity test on their newly acquired company. The Blumira platform au...
Read MoreHands in the Honeypot: Detecting Real Security Threats
A honeypot is a network device that either appears to contain or does actually contain vulnerable data intended to lure an attacker into accessing. Whether a threat actor tries to ...
Read More