The Art of Team Building: Blueprints from the Black Hat NOC
Here are my learnings from participating in NOCs at Black Hat Asia and Black Hat Las Vegas in 2023.
Here are my learnings from participating in NOCs at Black Hat Asia and Black Hat Las Vegas in 2023.
In this article we'll share some useful guidance for writing a real-world Zeek package in JavaScript or TypeScript.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
We couldn’t be more proud to work with a strategic partner that shares our vision and passion for advanced network security.
Whether or not you made it to RSA 2023, check out this blog to learn about key themes from this year’s conference.
Corelight announces the release of a new detection package “Sliver”, which identifies and raises alerts related to the Sliver C2 framework.
The first in a 5-part blog series from Ed Amoroso of TAG Cyber, that examines the use of the Corelight platform in the context of the "everywhere...
Corelight Labs reviewed a POC exploit for CVE-2022-30216 and wrote a Zeek-based detection and released the package on GitHub.
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.