7
active threats
23
active threats
58
active threats
142
active threats
SQL injection attempt on /api/auth/login — CVE-2024-3094 pattern detected
Brute force SSH authentication — 847 failed attempts in 60s
Cobalt Strike beacon C2 callback detected on port 443
Unusual lateral movement — SMB connection to 5 new hosts in 2 min
Ransomware payload signature match (LockBit 3.0) blocked at endpoint
Failed certificate validation — expired TLS cert on internal service
DNS tunneling attempt detected — abnormal TXT record queries
Privilege escalation — CVE-2024-21412 Windows SmartScreen bypass
Web Server
Uptime
99.97%
CPU
34%
Memory
62%
Database
Uptime
99.99%
CPU
48%
Memory
78%
Application
Uptime
98.42%
CPU
87%
Memory
91%
Jump Host
Uptime
94.21%
CPU
96%
Memory
94%
API Gateway
Uptime
99.95%
CPU
22%
Memory
45%
Storage
Uptime
99.12%
CPU
41%
Memory
88%
DNS
Uptime
99.98%
CPU
12%
Memory
28%
Endpoint
Uptime
0%
CPU
0%
Memory
0%
| ID | Severity | Description | Assignee | Status | Time Open |
|---|---|---|---|---|---|
| INC-0042 | critical | Active C2 communication from workstation-142 to known Cobalt Strike infrastructure | SC Sarah Chen | investigating | 12m |
| INC-0041 | critical | Potential data exfiltration — 2.4GB transferred to 77.91.124.0/24 subnet | MW Marcus Webb | containment | 28m |
| INC-0040 | high | LockBit 3.0 ransomware payload detected and quarantined on file-server-02 | SC Sarah Chen | remediation | 1h 14m |
| INC-0039 | high | Brute force campaign targeting SSH — source 91.234.99.0/24 — 12K attempts | JO James Okafor | monitoring | 2h 03m |
| INC-0038 | medium | Lateral movement detected from compromised endpoint to domain controller | MW Marcus Webb | investigating | 3h 47m |
| INC-0037 | medium | DNS tunneling — high volume abnormal TXT queries to suspicious domain | PP Priya Patel | investigating | 4h 12m |
| INC-0036 | low | Expired TLS certificate on internal API gateway causing service degradation | JO James Okafor | remediation | 6h 31m |