How Does the Kill Chain Apply to Network-Derived Evidence?
This article proposes ways that modern network-derived evidence applies to the kill chain.
This article proposes ways that modern network-derived evidence applies to the kill chain.
I ran into a sample of the Gozi banking malware in the wild. This is how I developed an open source detection package to find it with Zeek.
Learn about detections and findings from the network operations center (NOC) at Black Hat Asia 2023.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
As agencies and organizations continue the push to Zero Trust deadlines, we’ve all got some Trust issues to work on.
Learn how Corelight Smart PCAP helps customers streamline workflows and achieve incredible efficiency.
We're excited to announce the launch of our ICS/OT Collection to help extend foundational visibility.
Black Hat Asia 2023 NOC: Lessons in Deploying Corelight
We couldn’t be more proud to work with a strategic partner that shares our vision and passion for advanced network security.