Sharing our logging knowledge. A place we log our insights, experiences, and findings as it pertains to the world of logs.
Trunc provides a list of SQLi attacks in the wild. Honeypots records over 900 SQL injection attempts.
This article explains why it is important to include remote logging as a piece of your log management strategy.
The mysterious Mozlila User agent bot - attempting to compromise sites.
Ubuntu is a popular linux distribution and this article explains how logs are generated, where they are stored, and what they capture.
This article highlights the importance of logging, and shows how DevSecOp teams can use logs to understand what bad actors are looking for across their web assets.
In this article we explore the best practices and the type of events that you should always store in your central logging server.
14 days free trial. No credit card required.