Give me my stats!
In this post I am going to walk you through the process I used to develop a package called “my_stats” that pulls memory information from a running...
In this post I am going to walk you through the process I used to develop a package called “my_stats” that pulls memory information from a running...
To assist in detecting Zerologon (CVE-2020-1472), we’ve open sourced a Zeek package that detects both attempted and successful exploits.
We hosted a virtual CTF tournament where hundreds of players raced to solve security challenges using Zeek data in Splunk and Elastic. Here are the...
This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.
I love this quote by John Lambert. It perfectly describes the impact network defenders can achieve by pooling resources, insights, and techniques.
Corelight can improve operational excellence, performance, reliability, cost effectiveness, and security results in the AWS cloud.
We’ve just open sourced a Zeek package that detects exploit attempts and successes. This package demonstrates a couple of aspects that are worth...
We are pleased to launch our newest installment of the Corelight App for Splunk (Corelight App) and the Corelight Technical Add-on (TA).
This blog post explains three levels of analysis and how encryption has affected NSM, demonstrating that NSM remains relevant, despite encryption.