Friday, November 1, 2024
Homecyber securityFree Threat Hunting Platform Security Onion Released Updates - What's New!

Free Threat Hunting Platform Security Onion Released Updates – What’s New!

Published on

Malware protection

The third Beta version of Security Onion 2.4 is made available by Security Onion Solutions. A free and open platform for log management, enterprise security monitoring, and threat hunting is called Security Onion.

It consists of both their in-house tools, such as Alerts, Dashboards, Hunt, PCAP, and Cases, as well as other products like Playbook, FleetDM, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, Zeek, and Wazuh.

It has been downloaded more than 2 million times and is used by security teams worldwide to monitor and protect their organizations.

- Advertisement - SIEM as a Service
Overview of Security Onion 2.4 Beta 3

Security Onion Changes in 2.4.2 Beta 3

Beta 3 of Security Onion 2.4  add more Influxdb notifications, as well as links to SOC error messages that direct users to search for recent SOC-related errors.

Add a Protected checkbox when uploading an attachment, support for the Apple Silicon Elastic Agent Installer, and EQL to the playbook.

Additionally, it permits any Docker container to have additional hosts and custom bindings.

List of Alerts

It connects the log files from Docker containers to the Grid Interface. If a DNS record is discovered during setup, the user will also be prompted to confirm the manager nodes’ IP address. 

There are now quick links to common configurations. Supports authentication rate limiting, improves SOC configuration handling of lists, and Simplifies cloud detection.

For a complete list of changes in this release, check the Release Notes.

Few Known Issues That Ought To Be Fixed In The Next Releases

  • A 2.3 to 2.4 in-place upgrade is not possible. Data migration is still under investigation.
  • There will be no support for upgrades from this 2.4 Beta release to any other version. They will assist soup to upgrade 2.4 grids starting in RC1.
  • Ubuntu 20.04 support is not available until RC1. This has to do with a 3rd party dependency. 
  • ATT&CK Navigator doesn’t work correctly yet.
  • so-import-evtx imports logs but they don’t get parsed correctly.
  • The following installation modes are NOT supported at this time:
    • Heavy Node
    • Receiver Node
    • Analyst Workstation

“When we release the final version of Security Onion 2.4, we will announce an End Of Life (EOL) date for Security Onion 2.3. Security Onion 2.3 will continue to receive security patches and priority bug fixes until it reaches EOL”, reads the release notification.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

Hardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk

Recent analysis has revealed a concerning trend in mobile app security: Many popular apps...

GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections

Recent campaigns targeting victims through social engineering tactics utilize LUMMA STEALER with GHOSTPULSE as...