Skip to content
  • There are no suggestions because the search field is empty.

Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response

Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response

Corelight Bright Ideas Blog

This is the Custom Rich Text module

Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.

Blog Dashboard
Zeek

Zeek on Windows

A recap of the open-source work since the beginning of the Zeek collaboration with Microsoft. Originally posted on Zeek.org on Nov. 28, 2022.

Zeek

What makes evidence uniquely valuable?

Learn about the attributes of high-quality evidence. What should evidence look like, in order to be useful to defenders when the next security event...

Zeek

World’s first 100G Zeek sensor

As we finished rolling out our v21 software release, I was reminded of when I’d first read the 2015 “100G Intrusion Detection” paper written at...

Arch

Tracking down a glibc regression

We’d just upgraded our glibc package from 2.32 to 2.33, when we noticed some peculiar behavior. Here's how we tracked down a glibc regression.

Zeek

Meet the Corelight CTF tournament winners

We hosted a virtual CTF tournament where hundreds of players raced to solve security challenges using Zeek data in Splunk and Elastic. Here are the...

Zeek

Together is faster: Zeek for vulnerabilities

I love this quote by John Lambert. It perfectly describes the impact network defenders can achieve by pooling resources, insights, and techniques.

Zeek

Ripple20 Zeek package open sourced

Today we are open sourcing a Zeek package that passively detects the presence of some of the tell-tale signs that Treck devices can exhibit.

Zeek

Detecting GnuTLS CVE-2020-13777 using Zeek

Find a technical description of the bug, how it can be detected in network traffic, and how a short Zeek script can detect vulnerable servers.