How Can Kill Webs Change Security Thinking?
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Take a look at an incident we detected, investigated, triaged, and closed using Corelight at Black Hat Las Vegas 2023.
This article proposes ways that modern network-derived evidence applies to the kill chain.
I ran into a sample of the Gozi banking malware in the wild. This is how I developed an open source detection package to find it with Zeek.
Learn about detections and findings from the network operations center (NOC) at Black Hat Asia 2023.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
As agencies and organizations continue the push to Zero Trust deadlines, we’ve all got some Trust issues to work on.
Learn how Corelight Smart PCAP helps customers streamline workflows and achieve incredible efficiency.
We're excited to announce the launch of our ICS/OT Collection to help extend foundational visibility.