Sunday, June 16, 2024

Security Onion 2.4.50 Released for Defenders With New Features

Security Onion Solutions has recently rolled out the latest version of its network security monitoring tool, Security Onion 2.4.50.

This updated version comes equipped with an array of new features and bug fixes, making it an even more critical tool for enterprise security management, threat hunting, and network security monitoring.

Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

New Features and Enhancements

The release of Security Onion 2.4.50 marks a pivotal moment for the cybersecurity community. Among the notable new features is adding the Suricata PCAP module to Sensoroni, although it is currently disabled by default.

Security Onion 2.4.50 Released for Defenders With New Features
Security Onion 2.4.50 Released for Defenders With New Features (Source: security onion)

This module is expected to enhance network traffic analysis capabilities, providing defenders with more granular data for threat detection and analysis.

Another significant enhancement is introducing a new SOC action designed to show process ancestry. This feature will allow security operations center (SOC) analysts to trace the origins of processes, a critical capability for uncovering stealthy attacks and understanding attack chains.

Addressing the Community

Doug Burks, the founder of Security Onion Solutions, took to LinkedIn and Twitter to announce the release, emphasizing that Security Onion is developed “by defenders, for defenders.”

This community-driven approach ensures that the platform remains responsive to the evolving needs of cybersecurity professionals.

The development team, including Josh Brower, Jason Ertel, Wes Lambert, Corey Ogburn, Josh Patterson, and Mike Reeves, received special thanks for their hard work in making this release possible.

Additionally, the contribution of GitHub user petiepooo, who submitted pull requests and helped answer questions on the Security Onion Discussions site, was highlighted.

Impact on Cybersecurity Practices

Security Onion 2.4.50 is set to have a profound impact on cybersecurity practices. Providing advanced tools for log management, threat hunting, and security monitoring enables organizations to detect and respond to threats more effectively.

The platform integrates seamlessly with various security tools, including Suricata, Zeek, and Wazuh, making it a versatile solution for defending against sophisticated cyber threats.

The release of Security Onion 2.4.50 is a testament to the ongoing commitment of Security Onion Solutions to provide the cybersecurity community with powerful, open-source tools for defending against cyber threats.

Its new features and improvements make Security Onion indispensable for SOC analysts, network administrators, and security professionals worldwide. Users are encouraged to download the latest version and explore its enhanced capabilities for a more secure cyber environment.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles