Already have an account?Log in
Have questions?Contact us
Workplace, website, and app search
Unified logs, metrics, and APM data
SIEM, endpoint, and threat hunting
Store, search, analyze
Visualize, navigate, share
Managed Elasticsearch service
View all products
Tutorials, updates, people
ElasticON, meetups, virtual events
Tutorials and customer testimonials
Groups, forums, code
Project acceleration packages
Customer guidance and resources
Critical skill-building and certification
Upgrade the Elastic Stack.
Our story, Source Code, ESG
Case studies, videos, blogs
Peruse our opportunities
Find or become a partner
Results, filings, resources
Recognizing remarkable work
Elastic is a search company.
Elastic Security observed a ransomware and extortion campaign leveraging a combination of offensive security tools, LOLBAS, and exploits to deliver the CUBA ransomware malware.
Elastic Security is releasing detection logic for the Dirty Pipe exploit.
Elastic Security discovered PHOREAL malware, which is targeting Southeast Asia financial organizations, particularly those in the Vietnamese financial sector.
Analysis of the HERMETICWIPER malware targeting Ukranian organizations.
We explore using Elastic to extract Cobalt Strike beacon payloads from memory and use open source tools to analyze and group threat activity clusters.
Elastic Security verifies new destructive malware targeting Ukraine: Operation Bleeding Bear
Part 2 - Extracting configurations from Cobalt Strike implant beacons.
Part 1 - Processes and technology needed to extract Cobalt Strike implant beacons
Campaign research and analysis of an observed FORMBOOK intrusion attempt.
Spin up a fully loaded deployment on the cloud provider you choose. As the company behind Elasticsearch, we bring our features and support to your Elastic clusters in the cloud.