In partnership with

πŸ‘‹ Welcome to Unlocked

Detection failures often aren’t about a weak SOC or a flawed SIEM β€” they start earlier, with missing, incomplete, or ignored logs.
In 2025, attackers are exploiting this more aggressively than ever.

According to the IBM Cost of a Data Breach Report 2025, organizations took an average of 204 days to identify a breach β€” and log gaps were cited as a contributing factor in nearly half of incidents.

Worse: 59% of security teams reported that at least one major tool produced incomplete or missing telemetry during a real incident.

This week, we’re looking at why logs fail, where attackers hide, and how AI is reshaping visibility.

Let’s break it down.

βœ‰οΈ Our Sponsor

Realtime User Onboarding, Zero Engineering

Quarterzip delivers realtime, AI-led onboarding for every user with zero engineering effort.

✨ Dynamic Voice guides users in the moment
✨ Picture-in-Picture stay visible across your site and others
✨ Guardrails keep things accurate with smooth handoffs if needed

No code. No engineering. Just onboarding that adapts as you grow.

🚨 The Signal-to-Noise Problem in SIEM

SIEMs promise visibility β€” but often create fog.

Security teams now ingest logs from cloud, SaaS, endpoints, identity systems, OT/IoT devices, and third-party integrations. The result? Overload.

Key 2025 findings (Splunk State of Security):

  • 71% of SOC teams mute or ignore entire classes of SIEM alerts.

  • Over 40% of telemetry never becomes actionable due to formatting or normalization failures.

  • Cost pressures lead 1 in 3 organizations to discard logs to reduce ingestion fees.

This creates the perfect hiding place.

Attackers don’t need to evade your SIEM β€” they just need to blend into the noise you already ignore.

πŸ•΅οΈ How Attackers Exploit Log Blind Spots

Adversaries in 2025 aren’t just bypassing logs β€” they’re shaping them.

Modern log-evasion techniques include:

  • Log suppression: Disabling AWS CloudTrail, Azure Audit Logs, or Windows Event Logging during critical activity.

  • Living-off-the-land: Using legitimate admin tools that SIEM rules consider β€œroutine.”

  • Cloud console abuse: Actions inside cloud dashboards often produce limited audit entries unless enhanced logging is enabled.

  • Log poisoning: Injecting misleading entries to distort correlation.

  • Token-based attacks: Session hijacking produces β€œnormal” log entries unless you correlate device or location anomalies.

Recent cloud IR cases from Unit 42 and Mandiant show attackers now spend more time manipulating logs than trying to avoid them.

🧠 AI Is Transforming Breach Reconstruction

Traditional logging can’t keep up with highly distributed, multi-cloud environments β€” especially when logs are missing.
AI is now filling that gap.

How AI helps in 2025:

1. Pattern reconstruction
ML models infer likely attacker movement even when logs are incomplete or tampered with.

2. Cross-environment correlation
AI stitches together endpoint, identity, cloud, and SaaS activity that humans can’t manually correlate.

3. Negative-space detection
AI flags what should have happened:
β€œNo MFA challenge triggered when one was expected.”
β€œNo corresponding login for a privileged token use.”

4. Tamper detection
AI spots timestamp irregularities, entropy changes, and unusual event frequency β€” often the first signs of manipulation.

πŸ—„οΈ The Retention Crisis: Logs That Disappear Before You Need Them

Organizations still retain logs for far too short a window.

Key 2025 stats (Verizon DBIR 2025):

  • 64% of breaches are discovered months after compromise.

  • Over 45% of companies keep identity logs for fewer than 90 days.

  • Misconfigured or missing cloud logs contributed to 27% of breach investigations.

Attackers increasingly design β€œslow-quiet” campaigns meant to outlast log retention.

Best practices emerging in 2025:

  • 12–24 months of retention for IAM logs

  • Immutable storage for privileged actions

  • Cross-cloud log export to external storage

  • Cold storage archiving in low-cost object storage

πŸŒ₯️ Multi-Cloud Logging: A Growing Visibility Gap

With organizations now distributing workloads across AWS, Azure, GCP, Oracle, and dozens of SaaS tools, logging has become fragmented by default.

Each ecosystem logs:

  • different event types

  • different timestamps

  • different levels of detail

  • different retention defaults

This creates enormous β€œblind seams” where attackers hide.

More organizations in 2025 are adopting:

  • OpenTelemetry for consistent log collection

  • SIEM-agnostic log pipelines

  • Normalization layers before ingestion

  • Cloud-agnostic identity logs as the anchor source of truth

βš™οΈ How to Reduce Log Blind Spots (Without Blowing Up Your SIEM Bill)

For Security Teams:

β€’ Prioritize IAM, authentication, and token logs
β€’ Implement immutable storage for high-value logs
β€’ Use AI to detect log gaps and correlation anomalies
β€’ Build a unified log inventory covering SaaS, cloud, and endpoint sources
β€’ Export cloud logs externally to avoid deletion by attackers

For Leadership:

β€’ Treat logs as a security asset β€” not an IT cost
β€’ Budget for long-term retention using cold storage
β€’ Require log coverage verification in vendor onboarding

πŸ’‘ Unlocked Tip of the Week

Pick one high-risk system and ask:

β€œIf this were breached today, would our logs tell us β€” or would we only find out months later?”

If you’re unsure, your visibility isn’t complete.

πŸ“Š Poll of the Week

πŸ™‹ Author Spotlight

Meet Samuel Ortiz - Junior Platform Engineer

Samuel Ortiz works on platform automation, event logging, and backend systems that support modern identity architectures. With a background in Python, Go, and cloud-native tooling, he helps maintain telemetry pipelines, improve log reliability, and support incident analysis teams with better data quality.

Samuel is passionate about security automation and enjoys exploring how AI and machine learning can improve detection workflows. He brings a practical, engineering-first mindset, focusing on clean implementation and strong operational discipline.

βœ… Wrapping Up

The most dangerous breaches aren’t hidden because attackers are invisible β€”
they’re hidden because the telemetry to detect them never existed.

In 2025, visibility is a strategic imperative.
If identity is the new perimeter, logs are the new radar.

Improving retention, normalizing data, and adopting AI-driven correlation lifts the fog β€” and reveals what attackers hope you never see.

Stay observant. Stay proactive. Stay secure.

Until next time,

The Everykey Team



Keep Reading

No posts found