Data driven detection: Corelight’s approach to AI-powered NDR
Learn how Corelight combines Zeek data, ML, and GenAI workflows to fuel threat hunting, accelerate incident response, and disrupt advanced network...
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
Learn how Corelight combines Zeek data, ML, and GenAI workflows to fuel threat hunting, accelerate incident response, and disrupt advanced network...
See how we used Corelight's Open NDR platform to take an evidence-based security approach at Blackhat Europe 2023.
Take a look at an incident we detected, investigated, triaged, and closed using Corelight at Black Hat Las Vegas 2023.
I ran into a sample of the Gozi banking malware in the wild. This is how I developed an open source detection package to find it with Zeek.
Learn about detections and findings from the network operations center (NOC) at Black Hat Asia 2023.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
This blog will introduce a method of detecting the Pingback malware in which attackers often hide their communications in ping message payloads.
Discover what the terms detection, inference, and identification mean, and how they can help you when investigating activity in your environment.
In this blog post, find out how Corelight is making it easier to detect threats on your network, and provides even better data to respond to them.
Here's why Databricks plus Corelight is a powerful combination for cybersecurity, incident response and threat hunting.