Exposing Salt Typhoon on the network using the PEAK Threat Hunting Framework
Learn how Corelight data and the PEAK threat-hunting framework turn rich network evidence into a practical playbook for hunting Salt Typhoon.
Learn how Corelight data and the PEAK threat-hunting framework turn rich network evidence into a practical playbook for hunting Salt Typhoon.
Proactively defend against zero-days. Learn how with Cisco exploit lessons learned, warning signs from GreyNoise, F5 threats, and NDR.
Forrester recognized Corelight as a Leader in Network Analysis and Visibility (NAV) Solutions for innovation, flexibility, and transparency.
Corelight’s Flow Monitoring Sensor enriches AWS Flow Logs, expands VPC visibility, accelerates investigations, and cuts SIEM costs.
An AI-powered SOC must leverage exceptional best-in-class data quality to succeed. Corelight pursues three strategies to deliver it.
What stood out this year was the sheer volume of insecure application traffic. Corelight uncovered an unsecured corporate messaging app leaking...
Recapping our learnings from the Black Hat NOC, using packet captures and Zeek scripting to decode threat payloads.
From plaintext chat leaks to unencrypted SIP and LLM jailbreaks, the Black Hat USA 2025 NOC saw it all.
Speed up technical documentation with the open-source llm-styleguide-helper. It pairs Vale linting and AI to fix Microsoft Style Guide violations in...