Wednesday, December 6, 2023

Free Threat Hunting Platform Security Onion Released Updates – What’s New!

The third Beta version of Security Onion 2.4 is made available by Security Onion Solutions. A free and open platform for log management, enterprise security monitoring, and threat hunting is called Security Onion.

It consists of both their in-house tools, such as Alerts, Dashboards, Hunt, PCAP, and Cases, as well as other products like Playbook, FleetDM, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, Zeek, and Wazuh.

It has been downloaded more than 2 million times and is used by security teams worldwide to monitor and protect their organizations.

Overview of Security Onion 2.4 Beta 3

Security Onion Changes in 2.4.2 Beta 3

Beta 3 of Security Onion 2.4  add more Influxdb notifications, as well as links to SOC error messages that direct users to search for recent SOC-related errors.

Add a Protected checkbox when uploading an attachment, support for the Apple Silicon Elastic Agent Installer, and EQL to the playbook.

Additionally, it permits any Docker container to have additional hosts and custom bindings.

List of Alerts

It connects the log files from Docker containers to the Grid Interface. If a DNS record is discovered during setup, the user will also be prompted to confirm the manager nodes’ IP address. 

There are now quick links to common configurations. Supports authentication rate limiting, improves SOC configuration handling of lists, and Simplifies cloud detection.

For a complete list of changes in this release, check the Release Notes.

Few Known Issues That Ought To Be Fixed In The Next Releases

  • A 2.3 to 2.4 in-place upgrade is not possible. Data migration is still under investigation.
  • There will be no support for upgrades from this 2.4 Beta release to any other version. They will assist soup to upgrade 2.4 grids starting in RC1.
  • Ubuntu 20.04 support is not available until RC1. This has to do with a 3rd party dependency. 
  • ATT&CK Navigator doesn’t work correctly yet.
  • so-import-evtx imports logs but they don’t get parsed correctly.
  • The following installation modes are NOT supported at this time:
    • Heavy Node
    • Receiver Node
    • Analyst Workstation

“When we release the final version of Security Onion 2.4, we will announce an End Of Life (EOL) date for Security Onion 2.3. Security Onion 2.3 will continue to receive security patches and priority bug fixes until it reaches EOL”, reads the release notification.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Website

Latest articles

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...

Serpent Stealer Acquires Browser Passwords and Erases Intrusion Logs

Beneath the surface of the cyber realm, a silent menace emerges—crafted with the precision...

Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit...

Kali Linux 2023.4 Released – What’s New!

Kali Linux 2023.4, the latest version of Offensive Security's renowned operating system, has been...

Trickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison

A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware....

ICANN Launches RDRS to Assist Law Enforcement Agencies to Discover Private Info

ICANN is a non-profit organization that is responsible for coordinating the global internet's-DNSIP address...

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles