Detecting the new CallStranger UPnP vulnerability with Zeek
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
Open source Zeek is capable of analyzing RDP connections and does a fantastic job handling the many options and configurations the RDP protocol...
Richard shared his thoughts on our blog on why the overarching role of the network and election infrastructure is worthy of a deep assessment right...
Here's how to instrument and enable network security monitoring for a small office – home office (SOHO) environment.
Learn about the benefits of Corelight DNS logs, and how Splunk Enterprise Security can reach a new level of functionality through integration with...
Security teams would benefit from reviewing their NSM data to ensure that only authorized parties are interacting with their remote work...
Whether you’re a footsoldier or a tier-one analyst, a commanding view helps you outsmart and outlast adversaries. With Corelight, you can hold the...
Anyone worrying about detecting and responding to network resident threats would benefit from the data that Corelight provides.
RSA 2020 is fast approaching. The speaker sessions seem to be of high quality overall, but here are the 12 talks you should consider attending.