How Can Kill Webs Change Security Thinking?
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
This article proposes ways that modern network-derived evidence applies to the kill chain.
Whether or not you made it to RSA 2023, check out this blog to learn about key themes from this year’s conference.
Corelight announces the release of a new detection package “Sliver”, which identifies and raises alerts related to the Sliver C2 framework.
Recently Blackberry analyzed a new GoLang Remote Access Trojan (RAT) named “ChaChi.” Here's how Corelight Sensors can detect the ChaChi RAT.
Recently Blackberry analyzed a new GoLang Remote Access Trojan (RAT) named “ChaChi.” Here's how Corelight Sensors can detect the ChaChi RAT.
As we finished rolling out our v21 software release, I was reminded of when I’d first read the 2015 “100G Intrusion Detection” paper written at...
I am excited to announce Corelight’s v21 release, which delivers dozens of powerful C2 detections, extends analyst visibility around RDP connections,...
We’re excited to announce that the Command and Control (C2) Collection is now available with today’s launch of version 21 of the Corelight software.