#loganalysis hasil pencarian

Comparing Elasticsearch with Apache Doris: Part 1⃣ #loganalysis #invertedindex #Database

doris_apache's tweet image. Comparing Elasticsearch with Apache Doris: Part 1⃣

#loganalysis #invertedindex #Database

I've officially added IP traffic analysis + visualization to my Python #LogAnalysis project! 🎉 💻 Here’s what’s new: Parsed logs for IP frequency with Counter in Python Visualised IP traffic with Matplotlib 📊 Debugged tricky parsing and unpacking errors!

Phintineke's tweet image. I've officially added IP traffic analysis + visualization to my Python #LogAnalysis project! 🎉

💻 Here’s what’s new:

Parsed logs for IP frequency with Counter in Python
Visualised IP traffic with Matplotlib 📊
Debugged tricky parsing and unpacking errors!
Phintineke's tweet image. I've officially added IP traffic analysis + visualization to my Python #LogAnalysis project! 🎉

💻 Here’s what’s new:

Parsed logs for IP frequency with Counter in Python
Visualised IP traffic with Matplotlib 📊
Debugged tricky parsing and unpacking errors!
Phintineke's tweet image. I've officially added IP traffic analysis + visualization to my Python #LogAnalysis project! 🎉

💻 Here’s what’s new:

Parsed logs for IP frequency with Counter in Python
Visualised IP traffic with Matplotlib 📊
Debugged tricky parsing and unpacking errors!

Comparing Elasticsearch with Apache Doris: Part 2⃣ #loganalysis #fulltextsearch #aggregation #joinquery #database

doris_apache's tweet image. Comparing Elasticsearch with Apache Doris: Part 2⃣

#loganalysis #fulltextsearch #aggregation #joinquery #database

Exploring the intricacies of digital forensic investigations through in-depth log analysis, uncovering the attacker's IP address, geographic origin, and the exploited vulnerability for future protection and prevention measures. #forensicinvestigation #loganalysis

MsHudaBadi's tweet image. Exploring the intricacies of digital forensic investigations through in-depth log analysis, uncovering the attacker's IP address, geographic origin, and the exploited vulnerability for future protection and prevention measures.
#forensicinvestigation #loganalysis

So this took me a while... However, as a SOC analyst, I must emphasize the importance of event log analysis. I gained a great deal of knowledge analyzing logs with event viewer@LetsDefendIO app.letsdefend.io/my-badges/deta… #CyberSecurity #loganalysis


Elasticsearch DSL VS SQL in Apache Doris #loganalysis #DSL #dataengineer #database

doris_apache's tweet image. Elasticsearch DSL VS SQL in Apache Doris

#loganalysis #DSL #dataengineer #database

👀 Event logs can help you spot security events so you can protect your systems & data. However, logs are very noisy and log records can be hard to read. Check out this blog to learn more about audit logs, #LogAnalysis and log auditing software >> bit.ly/3IMPYOP

Netwrix's tweet image. 👀 Event logs can help you spot security events so you can protect your systems & data. However, logs are very noisy and log records can be hard to read. Check out this blog to learn more about audit logs, #LogAnalysis and log auditing software  >> bit.ly/3IMPYOP

🚨 New Writeup Alert! 🚨 "Volt Typhoon APT Walkthrough — TryHackMe Room Investigation Using Splunk & Threat Hunting…" by Visir is now live on IW! Check it out here: infosecwriteups.com/cbfcf48c33d7 #volttyphoon #infosecwriteups #loganalysis #tryhackmewalkthrough #blueteam


Day 3 of the @RealTryHackMe Advent of Cyber Challenge was all about stepping into the roles of both a defender (Blue team) and an attacker (Red team) to investigate and recreate a web-based attack #AdventOfCyber #LogAnalysis @cyber_with_tega @StellaObatoye @cyb3rn3t1cs

hercloset__'s tweet image. Day 3 of the @RealTryHackMe Advent of Cyber Challenge was all about stepping into the roles of both a defender (Blue team) and an attacker (Red team) to investigate and recreate a web-based attack 

#AdventOfCyber #LogAnalysis 

@cyber_with_tega @StellaObatoye @cyb3rn3t1cs

Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.

hercloset__'s tweet image. Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.
hercloset__'s tweet image. Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.
hercloset__'s tweet image. Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.


Effective incident response relies on hands-on practice with realistic SOC simulations that emphasize organized documentation, thorough log analysis, and cross-correlation to track attacker methods and speed resolution. #IncidentOps #LogAnalysis ift.tt/ikHx4Gn


Discover the power of #Python for log file analysis. Learn file operations, regex patterns, & cool analysis techniques to save time & catch issues faster. #CyberSecurity #LogAnalysis #Automation #SecureYourFortress @MarkBaggett 🔗 sans.org/u/1xsj

SANSDefense's tweet image. Discover the power of #Python for log file analysis. Learn file operations, regex patterns, & cool analysis techniques to save time & catch issues faster. #CyberSecurity #LogAnalysis #Automation #SecureYourFortress @MarkBaggett

🔗 sans.org/u/1xsj

Cloud environments are evolving—so should your log management! Discover how automation is redefining cloud monitoring in our latest blog! Read here: intuz.com/blog/automated… #CloudComputing #AI #LogAnalysis #Automation #CyberSecurity #CloudOps #DevOps #Intuz


🚨 Join our weekly livestream on Oct 6 at 2:30 PM EST, as we tackle “A Guide to Debugging in ProcessMaker Using Telescope.” 💫 Get notified ➡ bit.ly/3RNI2lQ #telescope #loganalysis #processautomation

processmaker's tweet image. 🚨 Join our weekly livestream on Oct 6 at 2:30 PM EST, as we tackle “A Guide to Debugging in ProcessMaker Using Telescope.” 💫 

Get notified ➡ bit.ly/3RNI2lQ

#telescope #loganalysis #processautomation

Join us June 4 at 2PM in Room 106! We’re showing how to triage mobile devices on-scene using log analysis to find key evidence fast. 💥 📱 All levels welcome | Attendees Only #DFIR #MobileForensics #LogAnalysis #LETech #Technosecurity #DigitalEvidence

Contact_APF's tweet image. Join us June 4 at 2PM in Room 106! We’re showing how to triage mobile devices on-scene using log analysis to find key evidence fast. 💥

📱 All levels welcome | Attendees Only

#DFIR #MobileForensics #LogAnalysis #LETech #Technosecurity #DigitalEvidence

Okta open-sources Sigma-based detection queries for Auth0 to spot account takeovers, rogue admin creation, and token theft. The Customer Detection Catalog on GitHub boosts proactive threat hunting. #Auth0Security #LogAnalysis #USA ift.tt/rZsMgGK


Logs are the quiet narrators of system activity. Logs reveal behavior and intent, moving cybersecurity beyond simple data to contextual understanding. Successful analysis requires discipline, structure, and an intuition to truly listen to the story every log tells. #Loganalysis


Log Analysis is the final stage that turns raw data into intelligence. It involves parsing, correlating, and visualizing entries using tools (Splunk/ELK) and techniques (anomaly detection). Logs become true intelligence only through analyst insight. #LogAnalysis #Cybersecurity


Every log tells a story: login attempts, firewall traffic, email activity. SIEM turns raw logs into actionable intelligence. #SIEM #LogAnalysis #CyberSecurity


Understanding different log types is the backbone of Cyber Security. From authentication to network traffic, each log tells a story about system activity. The right analysis can detect threats, prevent breaches, and strengthen defence. #CyberSecurity #LogAnalysis

Avengingsecure's tweet image. Understanding different log types is the backbone of Cyber Security.
From authentication to network traffic, each log tells a story about system activity. The right analysis can detect threats, prevent breaches, and strengthen defence.

#CyberSecurity #LogAnalysis

12/12🎯 CHALLENGE TIME: If you have access to a Linux system: Navigate to /var/log/ Check your auth.log Look for any failed attempts Share the weirdest thing you find! What's lurking in YOUR logs? 👇 #LogAnalysis #ServerSecurity #100DaysOfBlueTeam


Monitor your #DolphinDB cluster in real-time! Set up alerts via email with custom whitelist/blacklist filters. Never miss critical errors again. #LogAnalysis #devopsistechnologies


Okta open-sources Sigma-based detection queries for Auth0 to spot account takeovers, rogue admin creation, and token theft. The Customer Detection Catalog on GitHub boosts proactive threat hunting. #Auth0Security #LogAnalysis #USA ift.tt/rZsMgGK


Effective incident response relies on hands-on practice with realistic SOC simulations that emphasize organized documentation, thorough log analysis, and cross-correlation to track attacker methods and speed resolution. #IncidentOps #LogAnalysis ift.tt/ikHx4Gn


Day 39/100; Log Analysis Logs are the silent witnesses of cybersecurity. Today I dug into Windows Event Logs/Apache access logs, tracing suspicious activity from failed logins to POST requests. @ireteeh @segoslavia @comp_guyy #Cybersecurity #LogAnalysis #100DaysOfCyberSecurity

emeraald's tweet image. Day 39/100;  Log Analysis 
Logs are the silent witnesses of cybersecurity.
Today I dug into Windows Event Logs/Apache access logs, tracing suspicious activity from failed logins to POST requests.
@ireteeh @segoslavia @comp_guyy 
#Cybersecurity #LogAnalysis #100DaysOfCyberSecurity
emeraald's tweet image. Day 39/100;  Log Analysis 
Logs are the silent witnesses of cybersecurity.
Today I dug into Windows Event Logs/Apache access logs, tracing suspicious activity from failed logins to POST requests.
@ireteeh @segoslavia @comp_guyy 
#Cybersecurity #LogAnalysis #100DaysOfCyberSecurity

Day 38/100 #100DaysOfCybersecurity Today I learned how events become incidents, how to prioritize them, and how frameworks like SANS & NIST guide response. Also explored IR tools in a hands-on lab. @ireteeh @segoslavia @comp_guyy #CyberSecurity #IncidentResponse

emeraald's tweet image. Day 38/100 #100DaysOfCybersecurity
Today I learned how events become incidents, how to prioritize them, and how frameworks like SANS & NIST guide response. Also explored IR tools in a hands-on lab.
@ireteeh @segoslavia @comp_guyy 
#CyberSecurity #IncidentResponse
emeraald's tweet image. Day 38/100 #100DaysOfCybersecurity
Today I learned how events become incidents, how to prioritize them, and how frameworks like SANS & NIST guide response. Also explored IR tools in a hands-on lab.
@ireteeh @segoslavia @comp_guyy 
#CyberSecurity #IncidentResponse


What are the best practices for integrating AI into SIEM deployments? #LogAnalysis


Datadog costs piling up? You’re not alone. See how Netlink Voice got things under control with a smarter pipeline 👇🏻 hubs.ly/Q03xVh6f0 #telemetrypipeline #observability #loganalysis

mezmodata's tweet image. Datadog costs piling up? You’re not alone. See how Netlink Voice got things under control with a smarter pipeline 👇🏻

hubs.ly/Q03xVh6f0
#telemetrypipeline #observability #loganalysis

Memory Dump Analysis Anthology, Volume 11 (ISBN: 978-1912636112) is expected next month. #debugging #loganalysis #memorydumpanalysis #crashdumpanalysis #softwarediagnostics #memoryforensics

DumpAnalysis's tweet image. Memory Dump Analysis Anthology, Volume 11 (ISBN: 978-1912636112) is expected next month. #debugging #loganalysis #memorydumpanalysis #crashdumpanalysis #softwarediagnostics #memoryforensics

Today's full paper presentation at #w4a19 was about Computer Anxiety. Nice job, @thiagodonizetti #accessibility #loganalysis #HCI

santanavagner's tweet image. Today's full paper presentation at #w4a19 was about Computer Anxiety. Nice job, @thiagodonizetti 
#accessibility #loganalysis #HCI
santanavagner's tweet image. Today's full paper presentation at #w4a19 was about Computer Anxiety. Nice job, @thiagodonizetti 
#accessibility #loganalysis #HCI

Live Log Analyses with LogFlare. It is pretty useful. #seo #loganalysis #google


#DTDConf session about #loganalysis on Thursday is going to be fun 🙌 don’t miss my preso and following panel w/ the awesome @dawnieando @badams 👌 see you there!

aleyda's tweet image. #DTDConf session about #loganalysis on Thursday is going to be fun 🙌 don’t miss my preso and following panel w/ the awesome @dawnieando @badams 👌 see you there!

Comparing Elasticsearch with Apache Doris: Part 1⃣ #loganalysis #invertedindex #Database

doris_apache's tweet image. Comparing Elasticsearch with Apache Doris: Part 1⃣

#loganalysis #invertedindex #Database

GET SMARTER TODAY WITH AN INTRO TO LOG ANALYSIS! Click on the link below to get started! ow.ly/CzTS30neG5Q #LogAnalysis#Training #CyberTraining

j0emccray's tweet image. GET SMARTER TODAY WITH AN INTRO TO LOG ANALYSIS!
Click on the link below to get started!
ow.ly/CzTS30neG5Q
#LogAnalysis#Training #CyberTraining

Fasted Cardio and @CyberGent_101 ‘s new book! I love new ways of learning! #DFIR #LogAnalysis

theLouieA_'s tweet image. Fasted Cardio and @CyberGent_101 ‘s new book! I love new ways of learning! #DFIR #LogAnalysis

😓Reading manually tons of logs can be a painful task. It is not efficient and costs a lot. 🛑What is the alternative? 🆕Something new is coming from VirtualMetric B.V.🆕 Guess what? We have some hints! #monitoring #server #loganalysis #infrastructure

VirtualMetric's tweet image. 😓Reading manually tons of logs can be a painful task. It is not efficient and costs a lot. 🛑What is the alternative? 🆕Something new is coming from VirtualMetric B.V.🆕 Guess what? We have some hints! #monitoring #server #loganalysis #infrastructure
VirtualMetric's tweet image. 😓Reading manually tons of logs can be a painful task. It is not efficient and costs a lot. 🛑What is the alternative? 🆕Something new is coming from VirtualMetric B.V.🆕 Guess what? We have some hints! #monitoring #server #loganalysis #infrastructure
VirtualMetric's tweet image. 😓Reading manually tons of logs can be a painful task. It is not efficient and costs a lot. 🛑What is the alternative? 🆕Something new is coming from VirtualMetric B.V.🆕 Guess what? We have some hints! #monitoring #server #loganalysis #infrastructure
VirtualMetric's tweet image. 😓Reading manually tons of logs can be a painful task. It is not efficient and costs a lot. 🛑What is the alternative? 🆕Something new is coming from VirtualMetric B.V.🆕 Guess what? We have some hints! #monitoring #server #loganalysis #infrastructure

Comparing Elasticsearch with Apache Doris: Part 2⃣ #loganalysis #fulltextsearch #aggregation #joinquery #database

doris_apache's tweet image. Comparing Elasticsearch with Apache Doris: Part 2⃣

#loganalysis #fulltextsearch #aggregation #joinquery #database

A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis fireeye.com/blog/threat-re… #LogAnalysis #IncidentResponse #CyberSecurity #Infosec

ptracesecurity's tweet image. A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis  fireeye.com/blog/threat-re…  #LogAnalysis #IncidentResponse #CyberSecurity #Infosec
ptracesecurity's tweet image. A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis  fireeye.com/blog/threat-re…  #LogAnalysis #IncidentResponse #CyberSecurity #Infosec
ptracesecurity's tweet image. A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis  fireeye.com/blog/threat-re…  #LogAnalysis #IncidentResponse #CyberSecurity #Infosec
ptracesecurity's tweet image. A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis  fireeye.com/blog/threat-re…  #LogAnalysis #IncidentResponse #CyberSecurity #Infosec

Elasticsearch DSL VS SQL in Apache Doris #loganalysis #DSL #dataengineer #database

doris_apache's tweet image. Elasticsearch DSL VS SQL in Apache Doris

#loganalysis #DSL #dataengineer #database

Day 3 of the @RealTryHackMe Advent of Cyber Challenge was all about stepping into the roles of both a defender (Blue team) and an attacker (Red team) to investigate and recreate a web-based attack #AdventOfCyber #LogAnalysis @cyber_with_tega @StellaObatoye @cyb3rn3t1cs

hercloset__'s tweet image. Day 3 of the @RealTryHackMe Advent of Cyber Challenge was all about stepping into the roles of both a defender (Blue team) and an attacker (Red team) to investigate and recreate a web-based attack 

#AdventOfCyber #LogAnalysis 

@cyber_with_tega @StellaObatoye @cyb3rn3t1cs

Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.

hercloset__'s tweet image. Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.
hercloset__'s tweet image. Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.
hercloset__'s tweet image. Day 2 of the @RealTryHackMe Advent of Cyber Challenge was nothing short of thrilling! I stepped into the shoes of a SOC analyst facing overwhelming alerts and had the opportunity to distinguish between true positives (TPs) and false positives (FPs) while unraveling a mystery.


Renormalization trace and log analysis pattern has been published in Software Diagnostics Library #software #loganalysis #pattern dumpanalysis.org/blog/index.php…

DumpAnalysis's tweet image. Renormalization trace and log analysis pattern has been published in Software Diagnostics Library #software #loganalysis #pattern dumpanalysis.org/blog/index.php…

"Give me a quick value with log analysis, plz" Blinking status codes. Unstable URLs. Crawlability and Indexability of those URLs are under risk. Go, check, fix, enjoy. You're welcome. #technicalseo #loganalysis

elenbalash's tweet image. "Give me a quick value with log analysis, plz"

Blinking status codes. Unstable URLs. 
Crawlability and Indexability of those URLs are under risk.

Go, check, fix, enjoy. You're welcome. 

#technicalseo #loganalysis

Gartner estimates that the data volumes generated by IT infrastructure are increasing two to three-fold every year. Hence its highly essential to use technologies like Log Intelligence to reduce the noise in IT. cloudfabrix.com/resources/log-… #logmanagement #loganalysis #itops #aiops

TheFabrixAI's tweet image. Gartner estimates that the data volumes generated by IT infrastructure are increasing two to three-fold every year. Hence its highly essential to use technologies like Log Intelligence to reduce the noise in IT. cloudfabrix.com/resources/log-…
#logmanagement #loganalysis #itops #aiops

GET SMARTER TODAY WITH AN INTRO TO LOG ANALYSIS! Click on the link below to get started! ow.ly/CzTS30neG5Q #LogAnalysis#Training #CyberTraining

StrategicSec's tweet image. GET SMARTER TODAY WITH AN INTRO TO LOG ANALYSIS!
Click on the link below to get started!
ow.ly/CzTS30neG5Q
#LogAnalysis#Training #CyberTraining

One more note from a recent client project. The sudden rise of redirects in logs (wtf, 3x times???) just after a massive website update. Unfortunately, they came to log analysis after 1 week of traffic plunge. Fortunately, they did have at least 1 week of logs😅 #loganalysis

elenbalash's tweet image. One more note from a recent client project. The sudden rise of redirects in logs (wtf, 3x times???) just after a massive website update. Unfortunately, they came to log analysis after 1 week of traffic plunge. Fortunately, they did have at least 1 week of logs😅 #loganalysis

Loading...

Something went wrong.


Something went wrong.


United States Trends