Hunting GTPDOOR: The case of the "Black Hat Positive"
Recapping our learnings from the Black Hat NOC, using packet captures and Zeek scripting to decode threat payloads.
Recapping our learnings from the Black Hat NOC, using packet captures and Zeek scripting to decode threat payloads.
From plaintext chat leaks to unencrypted SIP and LLM jailbreaks, the Black Hat USA 2025 NOC saw it all.
Speed up technical documentation with the open-source llm-styleguide-helper. It pairs Vale linting and AI to fix Microsoft Style Guide violations in...
Introducing the industry's first MCP server, enabling AI agents to securely query network data directly from your SIEM.
Accelerate alert analysis with Corelight’s LLM prompts for Suricata and Corelight data, featuring summaries, threat analysis, and next steps.
Optimize NDR performance and reduce costs with hardware-based deduplication, seamlessly integrated into your sensor workflow.
Learn how to use Open WebUI knowledge bases to enhance your LLMs with private, local cybersecurity data for better queries, analysis, and incident...
Learn how Corelight combines Zeek data, ML, and GenAI workflows to fuel threat hunting, accelerate incident response, and disrupt advanced network...
Even when installed correctly, EDR can be evaded. Learn how network-first visibility stops hidden threats with Corelight Open NDR.