Back in the Black Hat NOC: A familiar mission, a new crew
What stood out this year was the sheer volume of insecure application traffic. Corelight uncovered an unsecured corporate messaging app leaking...
What stood out this year was the sheer volume of insecure application traffic. Corelight uncovered an unsecured corporate messaging app leaking...
Recapping our learnings from the Black Hat NOC, using packet captures and Zeek scripting to decode threat payloads.
From plaintext chat leaks to unencrypted SIP and LLM jailbreaks, the Black Hat USA 2025 NOC saw it all.
Four days in the Black Hat Asia 2025 NOC showed me why the network is “the source of truth”—and why even powerful tools need smart tuning to cut...
Recapping findings from the Black Hat Asia 2025 NOC: location data, plain text logins, and self-hosted apps without TLS.
Step into the Black Hat NOC as I recount my first experience with real-time threat hunting.
Recapping our learnings from the Network Operations Center (NOC) at Black Hat USA 2024. Using historical network logs to detect threats during the...
Learn how Corelight logs provide deep network visibility for incident response and threat hunting in the Black Hat NOC.
Our experience in the Black Hat NOC has made us into adherents for “Zero Trust…but verify.”