Hunting at Black Hat Asia 2025: There’s a First Time for Everything
Six hours a day of network threat hunting while jet-lagged? Yup, count me in. See how Corelight data helped me spot risks on the Black Hat Asia...
Six hours a day of network threat hunting while jet-lagged? Yup, count me in. See how Corelight data helped me spot risks on the Black Hat Asia...
Four days in the Black Hat Asia 2025 NOC showed me why the network is “the source of truth”—and why even powerful tools need smart tuning to cut...
Recapping findings from the Black Hat Asia 2025 NOC: location data, plain text logins, and self-hosted apps without TLS.
Learn how to use NDR to detect Volt Typhoon attacks that evade EDR, closing blindspots to stop intrusions before they become breaches.
Attackers now exploit edge devices, bypass EDR defenses, and move laterally in under a minute. Learn why continuous network visibility is critical.
Corelight’s Microsoft vTAP integration brings cloud-native packet mirroring to Azure, with broader support for AWS, GCP, and third-party packet...
Bring high-fidelity network evidence to any SIEM—without compromise.
Learn how Corelight’s anomaly detection improves threat detection, reduces false positives, and enables proactive threat hunting.
Learn how Map-Reduce and LLMs can be used to efficiently analyze huge datasets and improve threat hunting, incident response, and forensic analysis.