Log Management

Log file management tramite syslog-ng Giacomo Lanzi

Log File Management with the Secure Online Desktop service

IT systems produce large quantities of log files, very useful tools for guaranteeing data security and application stability. However, in a complex ecosystem, the quantity of files and their location can become two insurmountable obstacles to overcome, in case it is necessary to consult the data efficiently. This is where log management systems come into play, which thanks to technologies…

syslog server Piergiorgio Venuti

New service | Log Management – High performance service for collecting logs

syslog server – High performance service for collecting logs Use all the strengths of the syslog-ng Premium Edition Find logs, secure sensitive data with granular access policies and generate reports Forward logs to third-party tools   SYSLOG SERVER – CLOUD LOG MANAGEMENT SERVICE TO MANAGE YOUR LOGS Log Management service allows you to keep logs (applications, system, audit logs, query…

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • SEC Consult SA-20240527-0 :: Multiple vulnerabilities in HAWKI didactic interface May 28, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 27 SEC Consult Vulnerability Lab Security Advisory < 20240527-0 > ======================================================================= title: Multiple vulnerabilities product: HAWKI (Interaction Design Team at the University of Applied Sciences and Arts in Hildesheim/Germany) vulnerable version: 1.0.0-beta.1, versions before commit 146967f     fixed version: Github commit 146967f...
  • SEC Consult SA-20240524-0 :: Exposed Serial Shell on multiple PLCs in Siemens CP-XXXX Series May 28, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 27SEC Consult Vulnerability Lab Security Advisory < 20240524-0 > ======================================================================= title: Exposed Serial Shell on multiple PLCs product: Siemens CP-XXXX Series (CP-2014, CP-2016, CP-2017, CP-2019, CP-5014) vulnerable version: All hardware revisions fixed version: Hardware is EOL, no fix CVE number: - impact: Low...
  • SEC Consult SA-20240522-0 :: Broken access control & API Information Exposure in 4BRO App May 23, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 23SEC Consult Vulnerability Lab Security Advisory < 20240522-0 > ======================================================================= title: Broken access control & API Information Exposure product: 4BRO App vulnerable version: before 2024-04-17 fixed version: 2024-04-17 CVE number: - impact: Critical homepage: https://www.4bro.de found: 2023-05-07...
  • [CFP] Security BSides Ljubljana 0x7E8 | September 27, 2024 May 23, 2024
    Posted by Andraz Sraka on May 23MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM...
  • asterisk release 20.8.1 May 21, 2024
    Posted by Asterisk Development Team via Fulldisclosure on May 20The Asterisk Development Team would like to announce security release Asterisk 20.8.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/20.8.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 20.8.1 ## Change Log for Release asterisk-20.8.1 ### Links: - [Full ChangeLog](...
  • asterisk release 21.3.1 May 21, 2024
    Posted by Asterisk Development Team via Fulldisclosure on May 20The Asterisk Development Team would like to announce security release Asterisk 21.3.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/21.3.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 21.3.1 ## Change Log for Release asterisk-21.3.1 ### Links: - [Full ChangeLog](...
  • asterisk release 18.23.1 May 21, 2024
    Posted by Asterisk Development Team via Fulldisclosure on May 20The Asterisk Development Team would like to announce security release Asterisk 18.23.1. The release artifacts are available for immediate download at https://github.com/asterisk/asterisk/releases/tag/18.23.1 and https://downloads.asterisk.org/pub/telephony/asterisk Repository: https://github.com/asterisk/asterisk Tag: 18.23.1 ## Change Log for Release asterisk-18.23.1 ### Links: - [Full ChangeLog](...
  • CVE-2024-34058: Nethserver 7 & 8 stored cross-site scripting (XSS) in WebTop package May 21, 2024
    Posted by Andrea Intilangelo on May 20CVE-2024-34058: Nethserver 7 & 8 stored cross-site scripting (XSS) in WebTop package Use CVE-2024-34058. Additional info: NethServer is an Open Source operating system for the Linux enthusiast, designed for small offices and medium enterprises. From their website: "It&apos;s simple, secure and flexible" and "ready to deliver your messages, to […]
  • SEC Consult SA-20240513-0 :: Tolerating Self-Signed Certificates in SAP® Cloud Connector May 14, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 14SEC Consult Vulnerability Lab Security Advisory < 20240513-0 > ======================================================================= title: Tolerating Self-Signed Certificates product: SAP® Cloud Connector vulnerable version: 2.15.0 - 2.16.1 (Portable and Installer) fixed version: 2.16.2 (Portable and Installer) CVE number: CVE-2024-25642 impact: high homepage:...
  • TROJANSPY.WIN64.EMOTET.A / Arbitrary Code Execution May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/f917c77f60c3c1ac6dbbadbf366ddd30.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: TrojanSpy.Win64.EMOTET.A Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x64-bit "CRYPTBASE.dll" PE file in its current directory. Therefore, we can hijack the DLL and execute […]

Customers

Newsletter

{subscription_form_1}