Corelight named as a Leader in Forrester Wave™: Network Analysis and Visibility Solutions, Q4 2025
Corelight Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
START HERE
WHY CORELIGHT
SOLUTIONS
CORELIGHT LABS
Detect and disrupt evasive threats with high-fidelity, multi-layered detection.
SERVICES
ALLIANCES
USE CASES
Detect advanced attacks with Corelight
Corelight announces cloud enrichment for AWS, GCP, and Azure
Corelight's partner program
10 Considerations for Implementing an XDR Strategy
2025 Gartner® Magic Quadrant™ for NDR
October 30, 2025 by Tim Chiu
In today's rapidly evolving cybersecurity landscape, organizations face unprecedented challenges. Cyber threats are not only increasing in volume but are also becoming more sophisticated and evasive, using AI themselves to enhance their attacks. The attack surface has expanded dramatically, while Security Operations Centers (SOCs) are often left with fewer resources to combat these growing threats. Recent advisories, such as the CISA alert on state-sponsored actors like Salt Typhoon, highlight the urgent need for enhanced detection capabilities against highly persistent and evasive threats targeting critical infrastructure. The Verizon DBIR 2025 report reveals a significant shift in breach entry points for 2024. Exploitation of edge devices and VPNs, often hidden from typical security measures like EDR, surged as the fastest-growing method. This category jumped from 3% to 22% of breaches year-over-year. To address these vital issues, Corelight is announcing significant enhancements to our evasive threat detection capabilities, consisting of improvements to AI-powered threat detection capabilities (new anomaly detection and supervised ML models) and east-west (lateral movement) traffic analysis. This new release also includes improvements to Command and Control (C2) detection and brute force attack detection. These advancements are core to improving the detection of evasive threats, allowing organizations to protect their critical assets more effectively, and will be available in our upcoming 28.4 software release.
Part of our core multi-layered threat detection offering, Corelight's industry-leading anomaly detection capabilities have been improved to identify additional deviations from normal network behavior. This new release focuses on improvements to discovering anomalous and unusual server-based traffic. These types of behaviors are often missed by traditional signature-based detection, which often fails to detect novel or polymorphic threats in server-based traffic. Our evidence-first approach starts with feeding the best data to the newly enhanced anomaly detection, leveraging advanced machine learning algorithms to:
By quickly identifying these and other anomalies, Corelight empowers SOCs to detect evasive threats, including insider threats and zero-day exploits, that might otherwise slip past conventional defenses.
The rise of hybrid and multi-cloud environments has amplified the importance of east-west traffic (also known as lateral traffic) monitoring. Malicious actors, once inside the network, often move laterally to gain access to high-value assets. Corelight offers unparalleled visibility into east-west traffic, and with this release, enhances evasive threat detection in internal laterally moving network traffic related to Kerberos attacks and configuration:
These enhancements ensure that even if an attacker bypasses traditional defenses, their lateral movements are quickly detected, allowing for swift containment and remediation.
These enhancements, along with the addition of new supervised ML models in Corelight Sensor, new C2 detections, and brute force attack enhancements, bolster Corelight's industry-leading ability to detect evasive threats. The new supervised ML and C2 detections include these capabilities:
In a world where attackers are constantly refining their techniques to avoid detection, our advanced capabilities provide:
Corelight's latest enhancements to evasive threat detection, including improvements to anomaly detection, east-west detection (lateral movement), additional new C2, and new brute force attack detections, represent a significant leap forward in combating modern cyber threats. As cyber threats continue to increase in sophistication and evasiveness, and SOCs operate with fewer resources, our commitment to providing cutting-edge detection capabilities ensures that organizations can stay one step ahead. These improvements empower security teams with the visibility and intelligence needed to detect, investigate, and respond to even the most elusive threats, protecting their digital assets and maintaining business continuity.
For more about staying one step ahead of advanced attackers, watch our webinar on detecting evasive threats and download our whitepaper on multi-layered threat detection strategies. To learn more about Corelight's detection capabilities, visit our threat detection webpage.
Tagged With: Corelight, Network Security Monitoring, NDR, SOC, featured, threat detection