Featured Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 19, 2025
Zeek What did I just see? Detection, inference, and identification Discover what the terms detection, inference, and identification mean, and how they can help you when investigating activity in your environment. Richard Bejtlich Jul 30, 2019