Featured How to React(.js) to React2Shell and detecting behaviors to catch the Next(.js) big RCE Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 6, 2025
ransomware Using Corelight to Identify Ransomware Blast Radius Learn how Corelight’s Open NDR products and platforms help SOC teams identify ransomware blast radius. Chris Brown Sep 29, 2023
cybersecurity Detecting Storm-0558 using Corelight evidence Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558. Chris Brown Aug 2, 2023