<

2022

<

february

>

Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER

Elastic Security verified a data wiper malware campaign that is targeting Ukrainian systems. As this malware campaign is new, with more information being uncovered hourly, it is being referred to as HERMETICWIPER.

Elastic захищає від зловмисного програмного забезпечення для стирання даних, спрямованого на Україну: HERMETICWIPER

Elastic Security перевірила зловмисне програмне забезпечення для стирання даних, яке спрямоване на українські системи. Оскільки ця кампанія є новим явищем і ми щогодини дізнаємося щось нове, її називають HERMETICWIPER.

Elastic Stack 7.17.1 released

Read about the updates and bug fixes that have been included in this release.

Elastic and AWS: Seamlessly ingest logs and metrics into a unified platform with ready-to-use integrations

Elastic and AWS offer integrations that streamline data ingestion across AWS services into a unified platform so organizations can monitor, analyze, and protect their environment.

5 factors to consider when migrating Elastic to the cloud

Learn how Elastic addresses these five key factors —business continuity during migration, total cost of ownership optimization, disaster recovery, compliance, and security — to ensure your smooth transition to the cloud.

How visualization tools can unlock the potential of a truly data-driven organization

The latest generation of data viz brings together teams and data sources to surface insights or risks to improve business results

Observability: A Swiss Army knife for success in the cloud

In the cloud era, this rising capability can make digital experiences more reliable, innovative and profitable

Four ways to get the most out of cloud data storage

Storing enterprise data in the cloud can reduce costs and boost productivity—especially if you follow these guidelines

Exploring Windows UAC bypasses: Techniques and detection strategies

The Elastic Security Research team has identified new detection strategies to overcome the bypass methodologies used by adversaries to silently deploy malware onto an endpoint and elevate privileges without the end-user knowing.