Inside the Mind of a Cybersecurity Threat Hunter Part 2: Identifying Persistence Techniques
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Learn about the attributes of high-quality evidence. What should evidence look like, in order to be useful to defenders when the next security event...
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
Corelight offers a new core recommendation - Dtection.io - for customers using its Suricata integration.
Our new integration combines Corelight with the advanced vulnerability management, detection and response capabilities of Microsoft Defender for IoT.
If you missed the Office of Management and Budget memo M-21-31, let me provide you the information that you need to know if you are in the federal...
In the spirit of our open-source heritage, Corelight has produced a document breaking down our ability to identify and detect these attackers’...
I am excited to announce Corelight’s v21 release, which delivers dozens of powerful C2 detections, extends analyst visibility around RDP connections,...
We’re excited to announce that the Command and Control (C2) Collection is now available with today’s launch of version 21 of the Corelight software.
The CrowdStrike + Corelight partnership lets customers incorporate threat intelligence into Corelight Sensors to generate alerts and network evidence.