094f907144
* [New] Detection Alert on a Process Exhibiting CPU Spike This rule correlates security alerts with processes exhibiting unusually high CPU utilization on the same host and process ID within a short time window. This behavior may indicate malicious activity such as malware execution, cryptomining, exploit payload execution, or abuse of system resources following initial compromise. * Update securityt_alert_from_a_process_with_cpu_spike.toml * Update securityt_alert_from_a_process_with_cpu_spike.toml * Update rules/cross-platform/securityt_alert_from_a_process_with_cpu_spike.toml Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> * Rename securityt_alert_from_a_process_with_cpu_spike.toml to security_alert_from_a_process_with_cpu_spike.toml * Update security_alert_from_a_process_with_cpu_spike.toml * Rename security_alert_from_a_process_with_cpu_spike.toml to impact_alert_from_a_process_with_cpu_spike.toml * Update impact_alert_from_a_process_with_cpu_spike.toml * Update non-ecs-schema.json * Update rules/cross-platform/impact_alert_from_a_process_with_cpu_spike.toml Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com> --------- Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>