How to efficiently analyse logs from elastic search to look for vulnerabilities? [closed]

I am a working student as an information security analyst .
my company provides a bunch of software in our daily work like for example gitlab and jira . Every interaction between the user and the software is logged inside elastic stack .
L… Continue reading How to efficiently analyse logs from elastic search to look for vulnerabilities? [closed]

Sending logs with bug reports: how to defend against easy exploits like malicious file enlargement?

When a crash occurs or when a user reports a bug, I’d like to send my application’s logs to a cloud service (Firebase).
But I’ve just realised that there are tons of kindergarten level exploits. For example:

they can make these logs treme… Continue reading Sending logs with bug reports: how to defend against easy exploits like malicious file enlargement?

How to avoid security blind spots when logging and monitoring

Cybersecurity involves a balancing act between risk aversion and risk tolerance. Going too far to either extreme may increase cost and complexity, or worse: cause the inevitable business and compliance consequences of a successful cyberattack. The deci… Continue reading How to avoid security blind spots when logging and monitoring

Can anyone help finding what’s shady things are logged on my nginx webserver? [duplicate]

I have a hosted a simple react website(testing) with nginx webserver and cloudflare as ssl provider.My website is down from few days with cloudflare error 525 "SSL handshake failed".I was pretty sure my SSL keys are not expired,s… Continue reading Can anyone help finding what’s shady things are logged on my nginx webserver? [duplicate]