← Back to Blog

Developer Roll Up: October 2024

Picture of Christoper Luft, LimaCharlie Co-Founder and Creative Technologist
Christopher Luft
blog post header image

October brought another round of enhancements to LimaCharlie, strengthening your security operations toolkit. Let's dive into the latest features and improvements we've rolled out, plus get a preview of upcoming events:

Events

Webinars

A Smarter Approach to Managing Security Services: The SecOps Cloud Platform 

When: Nov 20

In this exclusive MSSP Alert webinar, we'll look at how LimaCharlie's SecOps Cloud Platform efficiently handles infrastructure, allowing you to focus on service, innovation and delivery.

Register now

Defender Fridays 

When: Every Friday @ 10:30am PT

Join us for deep-dive discussions on defensive cybersecurity with industry experts. This month's featured guests include Jessica Hebenstreit, CEO and Founder of Secitup Consulting, and Jonathan Johnson, Principal Windows Security Researcher at Huntress, who will explore Scoping Telemetry for Defender Needs. 

Register for the series

Recent Webinar Recordings

Better Together: Integrating Microsoft with LimaCharlie

Catch up on last months Defender Fridays episodes

October’s Releases

Enhanced Table Functionality

In this release, we added the ability to sort columns in the LimaCharlie web app. In addition, tables now support bulk actions (enable/disable and delete). This applies to the following sections of the web app: Adapters, Yara Rules, Secrets, Lookups, False Positive Rules and Detection and Response Rules.

EDR Sensor v4.31.1

Network stability improvements are now available across all platforms. These updates are included in both the cloud-triggered sensor upgrade and the local disk installation, with the flexibility to implement either version independently.

New MITRE Report API

Generate comprehensive MITRE ATT&CK coverage reports for your organization through our new REST API and CLI. The reports analyze your detection & response rules by mapping their MITRE tags (e.g., attack.t1000.xxx) to the MITRE framework.

Access the feature via:

The resulting JSON report can be used with the attack-navigator.