Featured How to React(.js) to React2Shell and detecting behaviors to catch the Next(.js) big RCE Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 6, 2025
LDAP log analyzer Expand visibility around authentication and application anomalies with Corelight’s new LDAP analyzer Corelight's new LDAP analyzer helps detect and stop attacks that use LDAP as a transport mechanism. Vince Stoffer Mar 20, 2023