Chocolate and peanut butter, Zeek and Suricata
We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key...
We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key...
Find a technical description of the bug, how it can be detected in network traffic, and how a short Zeek script can detect vulnerable servers.
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
Whether you’re a footsoldier or a tier-one analyst, a commanding view helps you outsmart and outlast adversaries. With Corelight, you can hold the...
I’m pleased to announce that Corelight sensors now support the Elastic Common Schema (ECS) via our Corelight ECS Mapping.
Here's how the new Corelight app for Splunk makes network-based threat hunting easier.
At Corelight, we want our products to be a source of visibility and insight. I’d like to take the opportunity to explain some of the techniques we...
Here's why the riskiest part of your Zeek deployment could be you... and how Corelight has got you covered.