Join us for ElasticON Global 2023: the biggest Elastic user conference of the year.
Register now for free
Deploy everything Elastic has to offer across any cloud, in minutes.
Search and discovery experiences
Unified logs, metrics, and traces
SIEM, endpoint, cloud, and XDR
Deploy and scale in any cloud
Elasticsearch, Kibana, and integrations
See the latest enhancements
Expert tips when upgrading
Read latest product guides
Join a global, distributed team
Boost conversions, lower bounce rates, and conquer abandoned shopping carts
Search applications of all kinds
Logs, metrics, APM, and more
Guidance to get started
Get help and customer resources
Have questions? Get in touch
Secured billions in assets
Increased customer trust
View all case studies
Tech topics, innovation, news
Skill building and certification
ElasticON, meetups, virtual events
Groups, forums, code
View all resources
Our story and leadership
Peruse our opportunities
Find or become a partner
Results, filings, resources
See remarkable work
Already have an account?
Let's discuss three benefits that Hardware Stack Protections brings beyond the intended exploit mitigation capability, and explain some limitations.
Elastic Security Labs discusses the EMOTET trojan and is releasing a tool to dynamically extract configuration files using code emulators.
This is the first in a series focused on the Time Travel Debugging (TTD) technology developed by Microsoft that was explored in detail during a recent independent research period.
In this blog, we will briefly talk about how we fine-tuned a transformer model meant for a masked language modeling (MLM) task, to make it suitable for a classification task.
The Elastic Security Labs team has been tracking REF2731, an 5-stage intrusion set involving the PARALLAX loader and the NETWIRE RAT.
Elastic Security has performed a deep technical analysis of the BUGHATCH malware. This includes capabilities as well as defensive countermeasures.
Elastic Security Labs releases a QBOT malware analysis report covering the execution chain. From this research, the team has produced a YARA rule, configuration-extractor, and indicators of compromises (IOCs).
Elastic Security has performed a deep technical analysis of the CUBA ransomware family. This includes malware capabilities as well as defensive countermeasures.
Elastic Security observed a ransomware and extortion campaign leveraging a combination of offensive security tools, LOLBAS, and exploits to deliver the CUBA ransomware malware.
Elastic Security discovered PHOREAL malware, which is targeting Southeast Asia financial organizations, particularly those in the Vietnamese financial sector.
Elastic Security verifies new destructive malware targeting Ukraine: Operation Bleeding Bear
See all in Groups & Tactics
In this research publication, we'll explore our analysis of the QBOT attack pattern — a full-featured and prolific malware family.
The latest organization under the microscope of the LAPSUS$ group is Okta. Threat hunt for the recent breach targeting Okta users using these simple steps in Elastic
Learn about the recent campaign of a Russia-based threat group known as Gamaredon Group. This post will review these details and provide detection strategies.
See all in Tools
Elastic Security Labs pairs research on emerging threats with analysis of strategic, operational, and tactical adversary objectives.