Turning the tables on the infiltrator
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
Learn how the kill web concept can be applied to cybersecurity, and how it addresses some of the concerns with the kill chain.
We couldn’t be more proud to work with a strategic partner that shares our vision and passion for advanced network security.
Whether or not you made it to RSA 2023, check out this blog to learn about key themes from this year’s conference.
Corelight announces the release of a new detection package “Sliver”, which identifies and raises alerts related to the Sliver C2 framework.
The first in a 5-part blog series from Ed Amoroso of TAG Cyber, that examines the use of the Corelight platform in the context of the "everywhere...
Corelight Labs reviewed a POC exploit for CVE-2022-30216 and wrote a Zeek-based detection and released the package on GitHub.
Organizations often implement a data collection strategy out of fear, collecting everything “just in case.” I challenge the assumption.
In this post Corelight Labs reviewed a proof of concept exploit for this vulnerability and wrote a Zeek-based detection for it.
This morning we announced Corelight Investigator, an open NDR platform that enables security teams with next-level evidence. Here is how it works.