Detecting Log4j Exploits Leading to Ransomware
For opportunistic ransomware groups, Log4j is a low-hanging fruit to gain initial access into an environment. Learn how to detect Log4j exploits.
Read MoreLog4Shell Alternative Local Trigger Analysis
Discover a Log4Shell alternative with a local trigger. Protect your systems from Log4Shell vulnerabilities effectively.
Read MoreG2’s Winter 2022 Momentum Report: Blumira Leads 4 Categories
Blumira earned 26 awards this quarter, including badges for Ease of Admin, Best Relationship, Best Est. ROI, Best Support and Fastest Implementation.
Read MoreZero-Day RCE Vulnerability CVE-2021-44228 aka Log4Shell Affects Java
Learn about CVE-2021-44228 (Log4Shell) and how to protect your organization from this critical security vulnerability.
Read MoreHow To Detect Signs of Cuba Ransomware
Understand the methods that the Cuba variant uses to compromise victim systems and respond early enough to stop an attack in progress.
Read MoreCritical Bugs Discovered In SonicWall SMA 100 Series Appliances
Multiple bugs were discovered in SonicWall’s Secure Mobile Access (SMA) 100 Series VPN appliances. These bugs range from medium to critical.
Read MoreBlumira Appoints Jim Simpson as CEO
Jim Simpson has been named chief executive officer of Blumira. Simpson has over two decades of experience growing successful security startups.
Read MoreHow To Detect AS-REP Roasting With Blumira
Based on a customer’s request, Blumira was able to create a detection built into platform to protect against AS-REP Roasting. Learn how.
Read MoreWhat To Log In A SIEM: Logging Best Practices
How do you know where to start when it comes to logging security events? We'll take you through 10 log sources you should prioritize in a SIEM.
Read MoreNew Detections: Microsoft 365, PowerShell & Linux
Discover the latest Blumira product updates for November 2021, enhancing your cybersecurity posture with new features and improvements.
Read More