Over the course of the last decade, Network Detection and Response (NDR) naturally evolved out of...
In November of 2022 we announced a Suricata ruleset specifically focused on detecting lateral...
Back in 2022, I did a Suricon presentation titled Jupyter Playbooks for Suricata. This led into a...
Have you ever counted how many computer devices, smart IoT gadgets, TV’s, kitchen appliances,...
Yesterday (18-July-2023) the OISF announced the general availability of Suricata version 7. It’s...
Network security plays a crucial role in today's digital landscape as it safeguards sensitive...
Writing Suricata rules has never been easier or faster since the release of the Suricata Language...
Earlier this week, we introduced the second set of visualizations provided by the SN-Hunt-1 Kibana...
Last week, we introduced the first set of visualizations provided by the SN-Hunt-1 Kibana dashboard...
This is the third post in a series based on my Suricon 2022 talk “Jupyter Playbooks for Suricata”....
This blog describes how to solve the Unit 42 Wireshark quiz for January 2023 with SELKS instead of...
Intrusion Detection Systems (IDS) can be powerful threat detection tools, but IDS users frequently...
This is the second post in a series that will be based on my Suricon 2022 talk “Jupyter Playbooks...
This is the first post in a series that will be based on my Suricon 2022 talk “Jupyter Playbooks...
When it comes to cyber threats, we understand that a threat to one organization can quickly become...
A while back I wrote a blog post about a packet filtering subcommand I implemented into GopherCAP....
When you already know the specific attacks faced by your organization, then the basic detection...
Intrusion detection systems (IDS) function incredibly well when it comes to making signature based...
Command-and-control (C2) attacks are bad news for any organization. Attackers use C2 servers to...
Intrusion detection systems (IDS) have proven to be a highly effective and commonly used method of...
Re-Introduction to PCAP Replay and GopherCAP
A while back we introduced GopherCAP, a simple tool...
Following the 10-December-2021 announcement of (CVE-2021-44228), Log4shell scanners have begun to...
So, you are considering migrating your legacy or aging intrusion detection and prevention system...
So, you are considering migrating your legacy or aging intrusion detection and prevention system...
Believe it or not, you can launch a turnkey Suricata IDS/IPS/NSM installation – with as few as 4...
As I mentioned in the introductory article in this series (see here >>), Suricata produces not only...
In cybersecurity as soon as you stand still, you’re falling behind. Change, whether it’s in the...
Suricata, the open source intrusion detection (IDS), intrusion prevention (IPS), and network...
Background
As we have previously written, for all Suricata’s capabilities, building out an...
Background
As we have previously written, for all Suricata’s capabilities, building out an...
Background
As we have previously written, for all Suricata’s capabilities, building out an...
For all Suricata’s capabilities, building out an enterprise-scale deployment of Suricata with...
Exciting news - the OISF just announced that Suricata 6 is now available. This is the culmination...
Stamus Networks? They are the Suricata company aren’t they? And Suricata? It’s an open source IDS...
Organizations seeking to proactively identify and respond to cyber threats in order to mitigate...