Posts categorized as 'security-research'



Vulnerability Scanner Logs: Z..

This article shares the logs generated by the OWASP ZAP application security testing tool (vulnerability scanner).



Posted in security-research   scanning-logs     /   2025-05-29

Detecting Web Attacks via 404..

This article highlights the importance of logging, and shows how DevSecOp teams can use logs to understand what bad acto...



Posted in log-analysis   security-research     /   2025-05-29

The Mozlila User Agent Bot

The mysterious Mozlila User agent bot - attempting to compromise sites.



Posted in user-agents   security-research     /   2025-05-29

SQL Injection Attack Log

Trunc provides a list of SQLi attacks in the wild. Honeypots records over 900 SQL injection attempts.



Posted in security-research   web_attacks     /   2025-05-29

Log Analysis: Investigating a..

Investigating and recovering a compromised Linode server running WordPress and latest Ubuntu.



Posted in security-research   log-analysis     /   2025-05-29

Log Analysis: HTTP Flood - DD..

Analysis of a HTTP Flood - DDoS - that happened against a site that we were monitoring.



Posted in security-research   log-analysis     /   2025-05-29

The Cisco Hack - Tracking the..

Cisco Compromise - Insights from Cisco and the trails the attackers can leave in your logs.



Posted in security-research     /   2025-05-29

Brute force attacks against W..

In this article we breakdown Brute force attacks against Windows Remote Desktop (RDP) that have been happening against o...



Posted in security-research   log-analysis   windows-logs     /   2025-05-29

Simple, Affordable, Log Management and Analysis.

14 days free trial. No credit card required.