This article highlights the importance of logging, and shows how DevSecOp teams can use logs to understand what bad actors are looking for across their web assets.
The mysterious Mozlila User agent bot - attempting to compromise sites.
Trunc provides a list of SQLi attacks in the wild. Honeypots records over 900 SQL injection attempts.
Investigating and recovering a compromised Linode server running WordPress and latest Ubuntu.
Cisco Compromise - Insights from Cisco and the trails the attackers can leave in your logs.
In this article we breakdown Brute force attacks against Windows Remote Desktop (RDP) that have been happening against our server on Azure.
Analysis of a HTTP Flood - DDoS - that happened against a site that we were monitoring.
This article shares the logs generated by the OWASP ZAP application security testing tool (vulnerability scanner).