The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Infrastructure monitoring
- Logs
- Application performance monitoring
- Dataprime
- Monitoring
- Log analytics
Turn AI ambition into secure operations
If you attended AWS re:Invent last year, it probably felt like there was an AI solution for everything. Models, copilots, agents; by the end, someone had to pitch...
Smarter SIEM starts here: Context, speed, and the power of MCP
Traditional SIEMs were built for a simpler time, when infrastructure was static, data was structured,...
Coralogix Expands Unified Threat Intelligence Coverage
Coralogix is excited to announce a major enhancement to our Unified Threat Intelligence (UTI) capabilities...
Raising the Bar in Observability and Security: Coralogix Extensions at Scale
In today’s high-velocity digital ecosystem, visibility isn’t enough. SREs and engineering leaders need real-time insights,...
GitHub Action Supply Chain Attack (CVE-2025-30066)
Summary On March 14, 2025, a critical supply chain attack targeted the widely used GitHub Action tj-actions/changed-files. This action, utilized in over 23,000 repositories, was compromised when attackers...
The Digital Operational Resilience Act (DORA) is coming – are you ready?
As the official implementation date approaches for the Digital Operational Resilience Act (DORA) – financial...
Track SBOM Compliance with Coralogix
A Software Bill of Materials (SBOM) is essentially an inventory of the components used to build a software artifact, such as an application. While the concept of tracking...
See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis
In the fast-paced world of business, timely and accurate incident investigations are crucial. The ability...
PCI DSS compliance with SIEM, CSPM and MxDR
In a world where increasing numbers of transactions are done online, compliance with PCI DSS (Payment Card Industry Data Security Standard) is crucial. However, with more organizations turning...
Dynamic Bad Actor Scoring in Coralogix
Bad bots, hackers, and other malicious agents can be tracked by a huge volume of metrics – session activity, HTTP headers, response times, request volume & cadence, and...
Palo Alto Global Protect Command Injection Vulnerability
On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its...
Advanced Security: Marking AWS WAF’s Homework
The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become...