Featured Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 19, 2025
Zeek Is there a ‘Z’ in “Vectra”? This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments. Vern Paxson May 21, 2019
Zeek Finding Very Damaging Needles in Very Large Haystacks In previous projects, I’ve tackled some needle-in-haystack problems. From these efforts, several high-level themes have emerged. Vern Paxson Sep 26, 2017