Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

We’re manually reading HTTPD log files and taking note of service abuse.
Example:
10.0.0.1 – – [01/Jan/1970:00:01:01 -0100] "GET /fckeditor/editor/filemanager/connectors/php/upload.php?Type=Media

10.0.0.2 – – [01/Jan/1970:00:01:10… Continue reading Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

We’re manually reading HTTPD log files and taking note of service abuse.
Example:
10.0.0.1 – – [01/Jan/1970:00:01:01 -0100] "GET /fckeditor/editor/filemanager/connectors/php/upload.php?Type=Media

10.0.0.2 – – [01/Jan/1970:00:01:10… Continue reading Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

Coralogix lands $25M Series B to rethink log analysis and monitoring

Logging and monitoring tends to be an expensive endeavor because of the sheer amount of data involved. Companies are therefore forced to pick and choose what they monitor, limiting what they can see. Coralogix wants to change that by offering a more flexible pricing model, and today the company announced a $25 million Series B […] Continue reading Coralogix lands $25M Series B to rethink log analysis and monitoring

Why is my web site being scanned for license.txt, and should I be worried?

Lately I am seeing multiple daily 404s for variations of “license.txt”, e.g., “wordpress/license.txt”, “blog/license.txt”, “old/license.txt”, “new/license.txt”. Here’s a little snippet of slightly redacted logfile to illustrate:

5.189.164… Continue reading Why is my web site being scanned for license.txt, and should I be worried?

Road to Detection: YARA-L Examples — Part 4 of 3

Road to Detection: YARA-L Examples — Part 4 of 3
Upon reading all of Part 1, Part 2 and Part 3 of my blog series that revealed our (Chronicle) approach to detection, many of you asked for more YARA-L detection language examples.
Continue reading Road to Detection: YARA-L Examples — Part 4 of 3