Open security — a methodology that shifts the dynamic of a security company’s relationship with its customer — has the potential to transform the cybersecurity industry by bringing security practitioners together to create a more resilient response.
There are many benefits to conducting security operations on a cloud-based platform. In this post, we’ll cover a few of the benefits Elastic Security for Cloud users experience, and how you can take advantage of an Elastic Cloud deployment yourself.
Open security — a methodology that shifts the dynamic of a security company’s relationship with its customer — can transform the cybersecurity industry by bringing security practitioners together to create a resilient response to enterprise threats.
In this research piece, we explore BPFDoor — a backdoor payload specifically crafted for Linux in order to gain re-entry into a previously or actively compromised target environment.
Microsoft 365 Defender team released a post detailing several identified vulnerabilities. These vulnerabilities allow adversarial groups to escalate privileges on Linux systems, allowing for deployment of payloads, ransomware, or other attacks.
The latest organization under the microscope of the LAPSUS$ group is Okta. Threat hunt for the recent breach targeting Okta users using these simple steps in Elastic
Elastic Security is releasing detection logic for the Dirty Pipe exploit.
Analysis of the HERMETICWIPER malware targeting Ukranian organizations.
In this post, we cover next steps the Elastic Security team is taking for users to continue to protect themselves against CVE-2021-44228, or Log4Shell.
Spin up a fully loaded deployment on the cloud provider you choose. As the company behind Elasticsearch, we bring our features and support to your Elastic clusters in the cloud.