Your network evidence, your SIEM, your way: Corelight’s open SIEM strategy empowers SOCs with a unified experience
Bring high-fidelity network evidence to any SIEM—without compromise.
Bring high-fidelity network evidence to any SIEM—without compromise.
Learn how to detect Agent Tesla, which consistently trends at the top of Any.Run’s malware trends list
Fresh from Splunk .conf24, here are some of the key points from throughout the week.
Download the Corelight App for Splunk and see how easy it is to get Corelight data into Splunk.
Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Today, we are excited to announce the Software...
Discover what the terms detection, inference, and identification mean, and how they can help you when investigating activity in your environment.
Corelight just released our v17 software. Here are the details about how these new features can enhance your data, speed up your IR workflow, and...
CVE-2019-0708 is a serious vulnerability awaiting exploitation. Learn how to use Corelight and Zeek logs to mitigate RDS/RDP vulnerabilities.
Over the last six months, a variety of MSPs were compromised. In this post, I aim to get a better understanding of those incidents.