How Does the Kill Chain Apply to Network-Derived Evidence?
This article proposes ways that modern network-derived evidence applies to the kill chain.
This article proposes ways that modern network-derived evidence applies to the kill chain.
Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558.
Black Hat Asia 2023 NOC: Lessons in Deploying Corelight
Corelight Entity Collection, now available in v26 software release, features 3 new packages: Known Entities, Application Identification and Local...
Corelight v27 software release enhances the platform’s integrated Suricata IDS functionality, further integrating alerts with rich context.
We recently discussed some methods for detecting the Log4j exploit, and we’ve developed another method that one running Zeek® or a Corelight sensor...
Simplify the detection of CVE-2021-44228 exploit (the log4j 0-day known as Log4Shell) with Corelight.
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
Learn how to detect the CVE-2021-42292 exploit, which relies on Excel fetching a second Excel file, through behavioral tricks.