Profiling Whonix
I downloaded Whonix version 15, in which two virtual machines work together to detect activity in a clever way.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
I downloaded Whonix version 15, in which two virtual machines work together to detect activity in a clever way.
In part 1, I showed how Corelight would produce logs for a clear-text HTTP session. In part 2, I perform the same transaction using TLS 1.2.
In this first of three parts, I will introduce TLS and demonstrate a clear-text HTTP session as interpreted by Corelight logs.
CVE-2019-0708 is a serious vulnerability awaiting exploitation. Learn how to use Corelight and Zeek logs to mitigate RDS/RDP vulnerabilities.
This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments.
Over the last six months, a variety of MSPs were compromised. In this post, I aim to get a better understanding of those incidents.
This post will outline some methods Zeek employs to provide visibility into SSH connections.
Last week, a candidate for a role at Corelight explained his motivation for joining the company: “the world is standardizing on Zeek.” Here's why...
I’m Amber Graner, and I’m excited to join Corelight, Inc as the Director of Community for the open source Zeek project.
Is IPS a feature or a product? I will present my view on the topic, but I’m more interested in hearing what readers think!