Back to all summaries

Investigating multi-vector attacks in Log Explorer

Jen Sells, Claudio Jolowicz, Nico Gutierrez
Analytics Logs Security R2 Storage SIEM Product News Connectivity Cloud

AI-Generated Summary: This is an automated summary created using AI. For the full details and context, please read the original post.

Cloudflare Log Explorer Enhances Security Forensics with Multi-Vector Attack Detection

Cloudflare has introduced significant enhancements to its Log Explorer, a powerful tool for security forensics and incident response. By integrating 14 new datasets, Log Explorer now provides 360-degree visibility into multi-vector attacks, enabling security analysts to detect and respond to sophisticated threats more effectively. The new datasets cover various aspects of Cloudflare's Application Services and Cloudflare One product portfolios, including application-layer HTTP requests, network-layer DDoS and Firewall logs, and Zero Trust Access events.

Key Features and Implications for Developers

The updated Log Explorer supports various log types, including:

  • Zone-Scoped Logs: Website traffic, security events, and edge performance
  • HTTP Requests: Comprehensive dataset for reconstructing session activity, exploit attempts, and bot patterns
  • Firewall Events: Critical evidence of blocked or challenged threats
  • DNS Logs: Identify cache poisoning attempts, domain hijacking, and infrastructure-level reconnaissance
  • NEL (Network Error Logging) Reports: Distinguish between coordinated DDoS attacks and legitimate network connectivity issues
  • Spectrum Events: Visibility into L4 traffic (TCP/UDP) for non-web applications
  • Page Shield: Track and audit unauthorized changes to client-side environment
  • Zaraz Events: Examine third-party tool interactions with user data

These enhancements enable developers to:

  • Detect and respond to multi-vector attacks more effectively
  • Improve Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)
  • Gain deeper insights into application performance, security, and user behavior
  • Enhance overall security posture and compliance with regulatory requirements

By leveraging the updated Log Explorer, developers can strengthen their security defenses and improve incident response capabilities, ultimately reducing the risk of data breaches and other security incidents.

Want to read the full article?

Read Full Post on Cloudflare Blog