Corelight & Microsoft Defender for IoT: Through an XDR lens
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
Learn how to detect the CVE-2021-42292 exploit, which relies on Excel fetching a second Excel file, through behavioral tricks.
Corelight offers a new core recommendation - Dtection.io - for customers using its Suricata integration.
Our new integration combines Corelight with the advanced vulnerability management, detection and response capabilities of Microsoft Defender for IoT.
Corelight invites blog readers to join capture the flag challenge with Splunk.
If you missed the Office of Management and Budget memo M-21-31, let me provide you the information that you need to know if you are in the federal...
Researchers at wiz.io found vulnerabilities in Windows OMI; Corelight has open-sourced a Zeek package for the most severe of these vulnerabilities.
Learn how to use Zeek script for detecting attempts to exercise the PetitPotam exploits.
In the spirit of our open-source heritage, Corelight has produced a document breaking down our ability to identify and detect these attackers’...