October 16, 2011 | Dominique Karg

New code piece: automatic plugin detection

We just uploaded a snippet written earlier this year, it requires regexp.py and can automatically identify the log type a certain IP is sending via syslog. …

October 12, 2011 | Dominique Karg

Logger benchmarking (commercial edition)

Hey all, I don’t want this to become a spam forum, nothing further in my intention than this, but Pascal ([email protected]) just shared some screenshots with us from a customer PoC, which are much more interesting than any internal benchmark we could do  in the labs. These screenshots show the Logger performing in the worst…

Get the latest security news in your inbox.

Subscribe via Email

October 10, 2011 | Dominique Karg

Feature Focus 2: Custom Tickets

The second installment of our feature focus series, this time focused on custom tickets. Custom tickets are a good way to feed the system with information that cannot be fed automatically and requires human intervention, have a look at the video to find out more. …

October 6, 2011 | Dominique Karg

New section: feature focus. Today: ip reputation and voice control

Hey all, today I’m proud to introduce the first voice controlled SIEM. One step closer to the war against the machines. I hope to be doing a lot of these and also to be expanding the tutorials with some videos and such. Any critics and feedback, be it positive or negative is welcome. The video quality is a…

October 4, 2011 | Jaime Blasco

Metasploit Payloads VS Libemu

                     Today we will analyze the detection capabilities of libemu http://libemu.carnivore.it/ [no longer available] using the Metasploit payloads. Libemu is a small library to detect and analyze x86 shellcodes using heuristics. We have written a small script to automatically generate Metasploit payloads and see if libemu is…

September 21, 2011 | Dominique Karg

RAID 11 @ Menlo Park, CA (notes and rants)

I attended RAID these past couple of days and must say I come out of it with mixed feelings. I had moments of great fun, saw some good stuff but most of the conferences were waaaaaaay too theoretical for my taste. Anyway, these notes have to be taken with a grain of salt. I know that many people have put…

September 19, 2011 | Dominique Karg

OISF/Suricata Brainstorming session

Just attended the OISF Suricata brainstorming session, it was really fun (unlike the RSA one 😉). Happening at the same venue than RAID 11 (which I’ll be attending with Jaime too), it was 3+ hours of brainstorming, discussing IDS/IPS and learning about a bunch of new concepts. I think they’re doing a real good job on it…

September 16, 2011 | Dominique Karg

3.0 is out!!!

We’re proud to announce the immediate availability of our newest release. This release has huge improvements, but the best way to check it out is: Check out the slideshare slides. Download it! Enjoy 😊 …

January 13, 2011 | Dominique Karg

Top 5 reasons for choosing Alienvault

This was a response from a customer whom I’m keeping anonymous unless he wants to step up, I was glad to read that and it always feels good to have this type of feedback. Sure…here they are in order of importance to me. 1. - Industry standard open source software - I don’t care who you are, if…

January 4, 2011 | Jaime Blasco

Inside Geinimi Android Trojan. Chapter Two: How to check remotely the presence of the trojan

In this chapter, we continue describing some of the trojan components. We realized that the code contains some ServerSocket stuff so let’s take a look at the system. To obtain more information about a process on android we can upload the lsof tool to a rooted via adb tools. You can download the lsof static file here http:/…

January 3, 2011 | Jaime Blasco

Inside Geinimi Android Trojan. Chapter One: Encrypted data and communication

Last week a new trojan affecting Android phones has been discovered. Called Geinimi, the trojan is hidden into other existing apps. At the moment, it has been detected only in third-party Chinese app markets and Google Android Market does not seem to be compromised. The main difference between Geinimi and previously discovered Android Trojans is the potential to communicate with…

Watch a Demo ›
Get Price Free Trial