Featured Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 19, 2025
Zeek Pingback: ICMP Tunneling Malware This blog will introduce a method of detecting the Pingback malware in which attackers often hide their communications in ping message payloads. Corelight Labs Team May 7, 2021