#elasticsecurity search results

You can train people to spot phishing links. But can your systems spot hidden threats? Real cybersecurity awareness starts in your data. #CyberSecurityAwarenessMonth #ElasticSecurity


The next evolution of SIEM is here — intelligent, contextual & autonomous. Deric Karunesudas (Elastic) explores how Agentic AI is transforming SOCs into self-learning systems that detect, decide & act at machine speed. #IndoSec2025 #ElasticSecurity #AgenticAI #SIEM

Tradepassglobal's tweet image. The next evolution of SIEM is here — intelligent, contextual & autonomous.

Deric Karunesudas (Elastic) explores how Agentic AI is transforming SOCs into self-learning systems that detect, decide & act at machine speed. 

#IndoSec2025 #ElasticSecurity #AgenticAI #SIEM
Tradepassglobal's tweet image. The next evolution of SIEM is here — intelligent, contextual & autonomous.

Deric Karunesudas (Elastic) explores how Agentic AI is transforming SOCs into self-learning systems that detect, decide & act at machine speed. 

#IndoSec2025 #ElasticSecurity #AgenticAI #SIEM

¿Cuál es la función de Elastic Security? #ElasticSecurity lleva a cabo la caza de amenazas de manera rápida y eficaz gracias a la integración de dos componentes de ciberseguridad: seguridad de Endpoint y SIEM. 🛡️También proporciona protección unificada en toda su infraestructura.

TilsorSA's tweet image. ¿Cuál es la función de Elastic Security?
#ElasticSecurity lleva a cabo la caza de amenazas de manera rápida y eficaz gracias a la integración de dos componentes de ciberseguridad: seguridad de Endpoint y SIEM.
🛡️También proporciona protección unificada en toda su infraestructura.

Enjoyed #RSAC2024! From engaging demos to insightful talks, exploring the art of the possible with customers, partners, and fellow Elasticians was invigorating. Special moments included the Women in Tech Breakfast, partner receptions, and meeting trailblazers. #ElasticSecurity

depeekii's tweet image. Enjoyed #RSAC2024! From engaging demos to insightful talks, exploring the art of the possible with customers, partners, and fellow Elasticians was invigorating. Special moments included the Women in Tech Breakfast, partner receptions, and meeting trailblazers. #ElasticSecurity
depeekii's tweet image. Enjoyed #RSAC2024! From engaging demos to insightful talks, exploring the art of the possible with customers, partners, and fellow Elasticians was invigorating. Special moments included the Women in Tech Breakfast, partner receptions, and meeting trailblazers. #ElasticSecurity

3/4 🚨 For persistence, a DLL 'oci.dll' ensures GhostEngine reloads after reboot. Elastic Security suggests monitoring for suspicious PowerShell activity, unusual process activity, & crypto-mining pool traffic. #ElasticSecurity #ThreatDetection #YARA

MostExploited's tweet image. 3/4 🚨 For persistence, a DLL 'oci.dll' ensures GhostEngine reloads after  reboot. Elastic Security suggests monitoring for suspicious PowerShell  activity, unusual process activity, & crypto-mining pool traffic.  #ElasticSecurity #ThreatDetection #YARA

Requests to Google Drive using specific URI parameters to download binaries and skip AV warnings followed by execution. If it were a dev, typically OAuth2 creds would be supplied from GCP and Drive API would be used. #Google #Malware #ElasticSecurity github.com/elastic/detect…

_xDeJesus's tweet image. Requests to Google Drive using specific URI parameters to download binaries and skip AV warnings followed by execution. If it were a dev, typically OAuth2 creds would be supplied from GCP and Drive API would be used. #Google #Malware #ElasticSecurity

github.com/elastic/detect…
_xDeJesus's tweet image. Requests to Google Drive using specific URI parameters to download binaries and skip AV warnings followed by execution. If it were a dev, typically OAuth2 creds would be supplied from GCP and Drive API would be used. #Google #Malware #ElasticSecurity

github.com/elastic/detect…

Explore advanced Linux persistence techniques in the latest Elastic Security Labs article. Discover methods for manipulating GRUB, exploiting PolicyKit, and enhancing defenses against threats. 🐧🔐 #LinuxSecurity #ElasticSecurity link: ift.tt/nvBjUAZ

TweetThreatNews's tweet image. Explore advanced Linux persistence techniques in the latest Elastic Security Labs article. Discover methods for manipulating GRUB, exploiting PolicyKit, and enhancing defenses against threats. 🐧🔐 #LinuxSecurity #ElasticSecurity

link: ift.tt/nvBjUAZ

New malware family FINALDRAFT discovered by Elastic Security Labs, exploiting Outlook via Microsoft Graph API. Its advanced tools suggest potential espionage. Linux variant also identified. 🦠🔐 #MalwareThreat #ElasticSecurity #USA link: ift.tt/DJzbecv

TweetThreatNews's tweet image. New malware family FINALDRAFT discovered by Elastic Security Labs, exploiting Outlook via Microsoft Graph API. Its advanced tools suggest potential espionage. Linux variant also identified. 🦠🔐 #MalwareThreat #ElasticSecurity #USA

link: ift.tt/DJzbecv

Exciting news! The "2025 State of Detection Engineering" report from Elastic Security Labs is out, detailing SIEM detection rules, threat analysis, and community collaboration. #ElasticSecurity #ThreatDetection #USA link: ift.tt/nFKMIV0

TweetThreatNews's tweet image. Exciting news! The "2025 State of Detection Engineering" report from Elastic Security Labs is out, detailing SIEM detection rules, threat analysis, and community collaboration. #ElasticSecurity #ThreatDetection #USA

link: ift.tt/nFKMIV0

🎯 Meet us at #NYSLGITDA 2025! Atlantic Data Security is proud to exhibit at the 2025 Spring Conference, alongside our partner Elastic Security. #AtlanticDataSecurity #ElasticSecurity #CyberSecurityExperts #GovernmentIT #NYSLGITDA2025 #SecureYourFuture

AtlanticDataSec's tweet image. 🎯 Meet us at #NYSLGITDA 2025!

Atlantic Data Security is proud to exhibit at the 2025 Spring Conference, alongside our partner Elastic Security.

#AtlanticDataSecurity #ElasticSecurity #CyberSecurityExperts #GovernmentIT #NYSLGITDA2025 #SecureYourFuture

Boost your security with AI-driven analytics from Elastic! 🚀🔒 Cut costs by 42%-56%, reclaim 74% of your team's time, and reduce security incidents by 90%. Ensure business continuity and stakeholder confidence. 🛡️💼 #ElasticSecurity #Elastic #KIDGroup #InfoFlow

KIDGroup1999's tweet image. Boost your security with AI-driven analytics from Elastic! 🚀🔒 Cut costs by 42%-56%, reclaim 74% of your team's time, and reduce security incidents by 90%. Ensure business continuity and stakeholder confidence. 🛡️💼  #ElasticSecurity #Elastic #KIDGroup #InfoFlow

Cybercrime is up 15% yearly—education & government are key targets. Elastic fights back with: 🧠 ML-powered threat detection 🔗 Seamless integration 💷 Cost-effective solutions 🌐 Community threat intel Smarter defense starts here. #ElasticSecurity #Cybercrime #PublicSector

KIDGroup1999's tweet image. Cybercrime is up 15% yearly—education & government are key targets.

Elastic fights back with:
🧠 ML-powered threat detection
🔗 Seamless integration
💷 Cost-effective solutions
🌐 Community threat intel
Smarter defense starts here.
#ElasticSecurity #Cybercrime #PublicSector

🚀 Elastic expands its bounty program on HackerOne to enhance SIEM & EDR detection rules. Global researchers are invited to identify vulnerabilities, focusing on Windows endpoints. 🔍 #ElasticSecurity #HackerOne #USA link: ift.tt/ORU0Gep

TweetThreatNews's tweet image. 🚀 Elastic expands its bounty program on HackerOne to enhance SIEM & EDR detection rules. Global researchers are invited to identify vulnerabilities, focusing on Windows endpoints. 🔍 #ElasticSecurity #HackerOne #USA

link: ift.tt/ORU0Gep

Boost your security with AI-driven analytics from Elastic! 🚀🔒 Cut costs by 42%-56%, reclaim 74% of your team's time, and reduce security incidents by 90%. Ensure business continuity and stakeholder confidence. 🛡️💼 #MachineLearning #ElasticSecurity #Elastic #KIDGroup #InfoFlow

_InfoFlow_'s tweet image. Boost your security with AI-driven analytics from Elastic! 🚀🔒 Cut costs by 42%-56%, reclaim 74% of your team's time, and reduce security incidents by 90%. Ensure business continuity and stakeholder confidence. 🛡️💼  #MachineLearning #ElasticSecurity #Elastic #KIDGroup #InfoFlow

Cybercrime is up 15% yearly—education & government are key targets. Elastic fights back with: 🧠 ML-powered threat detection 🔗 Seamless integration 💷 Cost-effective solutions 🌐 Community threat intel Smarter defense starts here. #ElasticSecurity #Cybercrime #PublicSector

_InfoFlow_'s tweet image. Cybercrime is up 15% yearly—education & government are key targets.

Elastic fights back with: 🧠 ML-powered threat detection 🔗 Seamless integration 💷 Cost-effective solutions 🌐 Community threat intel
Smarter defense starts here. #ElasticSecurity #Cybercrime #PublicSector

Creating detections for compromised accounts can be challenging for a security engineer to build. The Elastic Infosec team details how they use Elastic Security to protect Elastic systems in this blog. Check it out: go.es.io/47b1aPK #ElasticSecurity


🚀 Supercharge your SIEM switch! ➡️ Elastic Security's new Automatic Migration, powered by Search AI, makes moving from your SIEM a breeze. No more manual rebuilds! 💪 #AISecurity #SIEM #ElasticSecurity #Cybersecurity @elastic 🔗 elastic.co/blog/automatic…

depeekii's tweet image. 🚀 Supercharge your SIEM switch! ➡️ Elastic Security's new Automatic Migration, powered by Search AI, makes moving from your SIEM a breeze. No more manual rebuilds! 💪 #AISecurity #SIEM #ElasticSecurity #Cybersecurity @elastic 

🔗 elastic.co/blog/automatic…

You can train people to spot phishing links. But can your systems spot hidden threats? Real cybersecurity awareness starts in your data. #CyberSecurityAwarenessMonth #ElasticSecurity


The next evolution of SIEM is here — intelligent, contextual & autonomous. Deric Karunesudas (Elastic) explores how Agentic AI is transforming SOCs into self-learning systems that detect, decide & act at machine speed. #IndoSec2025 #ElasticSecurity #AgenticAI #SIEM

Tradepassglobal's tweet image. The next evolution of SIEM is here — intelligent, contextual & autonomous.

Deric Karunesudas (Elastic) explores how Agentic AI is transforming SOCs into self-learning systems that detect, decide & act at machine speed. 

#IndoSec2025 #ElasticSecurity #AgenticAI #SIEM
Tradepassglobal's tweet image. The next evolution of SIEM is here — intelligent, contextual & autonomous.

Deric Karunesudas (Elastic) explores how Agentic AI is transforming SOCs into self-learning systems that detect, decide & act at machine speed. 

#IndoSec2025 #ElasticSecurity #AgenticAI #SIEM

📢 Debunked? Elastic pushes back hard on claims of a critical zero-day RCE in their Defend EDR product. Get the full story! #CyberSecurity #ElasticSecurity bleepingcomputer.com/news/security/…


Cybercrime is up 15% yearly—education & government are key targets. Elastic fights back with: 🧠 ML-powered threat detection 🔗 Seamless integration 💷 Cost-effective solutions 🌐 Community threat intel Smarter defense starts here. #ElasticSecurity #Cybercrime #PublicSector

_InfoFlow_'s tweet image. Cybercrime is up 15% yearly—education & government are key targets.

Elastic fights back with: 🧠 ML-powered threat detection 🔗 Seamless integration 💷 Cost-effective solutions 🌐 Community threat intel
Smarter defense starts here. #ElasticSecurity #Cybercrime #PublicSector

Cybercrime is up 15% yearly—education & government are key targets. Elastic fights back with: 🧠 ML-powered threat detection 🔗 Seamless integration 💷 Cost-effective solutions 🌐 Community threat intel Smarter defense starts here. #ElasticSecurity #Cybercrime #PublicSector

KIDGroup1999's tweet image. Cybercrime is up 15% yearly—education & government are key targets.

Elastic fights back with:
🧠 ML-powered threat detection
🔗 Seamless integration
💷 Cost-effective solutions
🌐 Community threat intel
Smarter defense starts here.
#ElasticSecurity #Cybercrime #PublicSector

🔐 With great data comes great responsibility. Elastic helps you detect threats, block unauthorized access & stay compliant — in real time. 🚨🛡️No breaches. No drama. Just smart, proactive security. 💪 🎥 youtube.com/watch?v=co3rdh… #ElasticSecurity #InfoFlow #KIDGroup

_InfoFlow_'s tweet card. Mitigating cybersecurity risks with Elasticsearch

youtube.com

YouTube

Mitigating cybersecurity risks with Elasticsearch


🔐 With great data comes great responsibility. Elastic helps you detect threats, block unauthorized access & stay compliant — in real time. 🚨🛡️No breaches. No drama. Just smart, proactive security. 💪 🎥 youtube.com/watch?v=co3rdh… #ElasticSecurity #InfoFlow #KIDGroup

KIDGroup1999's tweet card. Mitigating cybersecurity risks with Elasticsearch

youtube.com

YouTube

Mitigating cybersecurity risks with Elasticsearch


🚀 Supercharge your SIEM switch! ➡️ Elastic Security's new Automatic Migration, powered by Search AI, makes moving from your SIEM a breeze. No more manual rebuilds! 💪 #AISecurity #SIEM #ElasticSecurity #Cybersecurity @elastic 🔗 elastic.co/blog/automatic…

depeekii's tweet image. 🚀 Supercharge your SIEM switch! ➡️ Elastic Security's new Automatic Migration, powered by Search AI, makes moving from your SIEM a breeze. No more manual rebuilds! 💪 #AISecurity #SIEM #ElasticSecurity #Cybersecurity @elastic 

🔗 elastic.co/blog/automatic…

Boost your security with AI-driven analytics from Elastic! 🚀🔒 Cut costs by 42%-56%, reclaim 74% of your team's time, and reduce security incidents by 90%. Ensure business continuity and stakeholder confidence. 🛡️💼 #MachineLearning #ElasticSecurity #Elastic #KIDGroup #InfoFlow

_InfoFlow_'s tweet image. Boost your security with AI-driven analytics from Elastic! 🚀🔒 Cut costs by 42%-56%, reclaim 74% of your team's time, and reduce security incidents by 90%. Ensure business continuity and stakeholder confidence. 🛡️💼  #MachineLearning #ElasticSecurity #Elastic #KIDGroup #InfoFlow

Deploy free and open #ElasticSecurity to easily include high-volume data sources in your day-to-day #security operations → go.es.io/3qCfzhv

elastic's tweet image. Deploy free and open #ElasticSecurity to easily include high-volume data sources in your day-to-day #security operations → go.es.io/3qCfzhv

In response to the Microsoft #HAFNIUM 0-day exploit, #ElasticSecurity has identified IoCs for highly damaging adversary objectives. Users with on-premise Exchange servers are advised to patch as soon as possible. Read our identified IoCs → go.es.io/2O1WzMk

elastic's tweet image. In response to the Microsoft #HAFNIUM 0-day exploit, #ElasticSecurity has identified IoCs for highly damaging adversary objectives. 

Users with on-premise Exchange servers are advised to patch as soon as possible. Read our identified IoCs → go.es.io/2O1WzMk

Protecting AWS and Okta cloud platforms with Elastic Security @threatpunter @brent_murphy #elasticsecurity #aws #okta dlvr.it/Rf27Py

blueteamsec1's tweet image. Protecting AWS and Okta cloud platforms with Elastic Security @threatpunter @brent_murphy #elasticsecurity #aws #okta dlvr.it/Rf27Py

Crush alert fatigue with prioritized correlations. #ElasticSecurity 7.10 enables security teams to automate the detection and prioritization of complex threats with high-fidelity alerts. Plus, enjoy prebuilt detections for @Azure, #GCP, and @Zoomgo.es.io/32MLhQo

elastic's tweet image. Crush alert fatigue with prioritized correlations. 

#ElasticSecurity 7.10 enables security teams to automate the detection and prioritization of complex threats with high-fidelity alerts. Plus, enjoy prebuilt detections for @Azure, #GCP, and @Zoom → go.es.io/32MLhQo

No REST for the query. With osquery integration now available in #ElasticSecurity 7.13, you don’t need REST API scripting to run, schedule, or manage queries. Learn more: go.es.io/3wFtfvS


Leave cyber threats nowhere to hide. #ElasticSecurity 7.12 brings analyst-driven correlation, behavioral ransomware prevention, and more. Read the full release highlights: go.es.io/3tRi1TB

elastic's tweet image. Leave cyber threats nowhere to hide. #ElasticSecurity 7.12 brings analyst-driven correlation, behavioral ransomware prevention, and more. Read the full release highlights: go.es.io/3tRi1TB

In #ElasticSecurity 7.12, analyst-driven correlation reveals relationships between key data points for faster and more effective #threathunting. That’s not all: behavioral ransomware prevention is now available in a click. Read our full release highlights: go.es.io/3lPW3NU

elastic's tweet image. In #ElasticSecurity 7.12, analyst-driven correlation reveals relationships between key data points for faster and more effective #threathunting. That’s not all: behavioral ransomware prevention is now available in a click.
Read our full release highlights: go.es.io/3lPW3NU

The expectations and demands of #SIEM have evolved for security teams to adapt to changing threats, environments, and perimeters. In this blog, we cover the top 5 SIEM considerations of 2021 and how #ElasticSecurity satisfies each → go.es.io/3rhQpGq

elastic's tweet image. The expectations and demands of #SIEM have evolved for security teams to adapt to changing threats, environments, and perimeters. 

In this blog, we cover the top 5 SIEM considerations of 2021 and how #ElasticSecurity satisfies each → go.es.io/3rhQpGq

Protect your cloud & remote users today — new detections for @Azure, @GoogleCloud, and @Zoom_US have arrived with #ElasticSecurity 7.10. Reclaim control over your cloud infrastructure and apps. Learn how → go.es.io/2Wguamm

elastic's tweet image. Protect your cloud & remote users today — new detections for @Azure, @GoogleCloud, and @Zoom_US  have arrived with #ElasticSecurity 7.10. 

Reclaim control over your cloud infrastructure and apps. Learn how → go.es.io/2Wguamm

Why #ElasticSecurity? Aaron Jewitt, principal security analyst at Elastic, explains why and shares a demo of Fleet to deploy endpoint security to your Windows, Linux, and macOS VMs to quickly instrument your malware sandbox. #ElasticCC Learn more → go.es.io/3bLPAPg

elastic's tweet image. Why #ElasticSecurity? 

Aaron Jewitt, principal security analyst at Elastic, explains why and shares a demo of Fleet to deploy endpoint security to your Windows, Linux, and macOS VMs to quickly instrument your malware sandbox. #ElasticCC

Learn more → go.es.io/3bLPAPg

#ElasticSecurity 7.14 arms analysts to take instant action across distributed endpoints. Host isolation enables responders to quickly quarantine compromised endpoints, while saved osquery searches on Elastic Agent streamline inspection. Learn more → go.es.io/3lvMmpT


In our mission to arm *every* analyst to succeed, we’ve greatly enhanced keyboard support and improved screen reader support in #ElasticSecurity 7.11, making our solution more accessible than ever. Learn more → go.es.io/3kdCyOA

elastic's tweet image. In our mission to arm *every* analyst to succeed, we’ve greatly enhanced keyboard support and improved screen reader support in #ElasticSecurity 7.11, making our solution more accessible than ever. Learn more → go.es.io/3kdCyOA

Protection is only as complete as the data you’re able to monitor. With #ElasticSecurity, collect and normalize from any and all data sources to protect, detect, and respond across your entire ecosystem. Download our new white paper to learn more → go.es.io/35wWpCE

elastic's tweet image. Protection is only as complete as the data you’re able to monitor. 

With #ElasticSecurity, collect and normalize from any and all data sources to protect, detect, and respond across your entire ecosystem.

Download our new white paper to learn more → go.es.io/35wWpCE

It may be Cybersecurity Awareness Month, but protecting your organization is a 24/7/365 job. See how we're arming every analyst with free and open #ElasticSecurity to take on threats for any season → go.es.io/3avH8DF

elastic's tweet image. It may be Cybersecurity Awareness Month, but protecting your organization is a 24/7/365 job. See how we're arming every analyst with free and open #ElasticSecurity to take on threats for any season → go.es.io/3avH8DF

From beginning to endpoint... and beyond. Malicious behavior protection, new in #ElasticSecurity 7.15, arms users to stop advanced threats at the endpoint with a new layer of protection for Linux, Windows, and macOS hosts. Learn more → go.es.io/2XMsy8j

elastic's tweet image. From beginning to endpoint... and beyond. Malicious behavior protection, new in #ElasticSecurity 7.15, arms users to stop advanced threats at the endpoint with a new layer of protection for Linux, Windows, and macOS hosts. Learn more → go.es.io/2XMsy8j

Loading...

Something went wrong.


Something went wrong.


United States Trends