Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.

The post Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques appeared first on Security Intelligence.

Continue reading Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Applying Machine Learning to Improve Your Intrusion Detection System

Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.

The post Applying Machine Learning to Improve Your Intrusion Detection System appeared first on Security Intelligence.

Continue reading Applying Machine Learning to Improve Your Intrusion Detection System

Detect Endpoint Threats by Analyzing Process Logs in QRadar

Using an SIEM solution such as QRadar, security professionals can analyze process logs to detect, hunt and trace the source of threats.

The post Detect Endpoint Threats by Analyzing Process Logs in QRadar appeared first on Security Intelligence.

Continue reading Detect Endpoint Threats by Analyzing Process Logs in QRadar

How to Add User-Defined AQL Functions in QRadar

IT professionals can leverage user-defined AQL functions in QRadar to perform complex calculations and analyze data retrieved from the Ariel databases.

The post How to Add User-Defined AQL Functions in QRadar appeared first on Security Intelligence.

Continue reading How to Add User-Defined AQL Functions in QRadar