Black Hat Europe 2025: Going Into the Fire
During Black Hat Europe 2025, I had the honor to join our team of “firefighters” at the Black Hat NOC and feel the heat for real.
During Black Hat Europe 2025, I had the honor to join our team of “firefighters” at the Black Hat NOC and feel the heat for real.
Working the Black Hat NOC is finding a "needle in a needle stack." I learned that alerts are only one part of the equation; context is what really...
Defending the SCinet network is critical work. See how we handled orders of magnitude more traffic using Corelight’s Open NDR Platform.
Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network.
Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code...
Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code...
Enhanced anomaly detection and east-west visibility improve evasive threat detection, reduce false positives, and help SOC teams focus on critical...
Enhanced anomaly detection and east-west visibility improve evasive threat detection, reduce false positives, and help SOC teams focus on critical...
Learn how to hunt F5 BIG-IP exploitation when no PoCs exist: spot Client Authentication Bypass, baseline incoming SSH, and detect SSH imposters.