Black Hat NOC: Findings from Europe & thoughts for Asia 2024
See how we used Corelight's Open NDR platform to take an evidence-based security approach at Blackhat Europe 2023.
See how we used Corelight's Open NDR platform to take an evidence-based security approach at Blackhat Europe 2023.
Hunt of the Month: Detecting AsyncRAT Malware Over HTTPS
Learn how Zeek’s metadata approach can help focus patching efforts for the SSH “Terrapin” attack.
Learn why adding Corelight to your cybersecurity arsenal, alongside existing NGFWs, is a strategic necessity.
Learn how threat hunters can identify MITRE ATT&CK persistence techniques.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Learn how Corelight is using AI in its NDR products to help SOC teams be even more productive.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Take a look at an incident we detected, investigated, triaged, and closed using Corelight at Black Hat Las Vegas 2023.