Give me my stats!
In this post I am going to walk you through the process I used to develop a package called “my_stats” that pulls memory information from a running...
In this post I am going to walk you through the process I used to develop a package called “my_stats” that pulls memory information from a running...
This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.
Corelight recently teamed up with SOC Prime, creators of advanced cyber analytics platforms, to add support for the entire Zeek data set into Sigma.
We are proud to announce that in our v19 software release we have delivered a sensor that combines and integrates Zeek and Suricata with three key...
We are excited to announce the expansion of our ETC. In this post, I will provide some further details and what the research team is working on next!
Find a technical description of the bug, how it can be detected in network traffic, and how a short Zeek script can detect vulnerable servers.
Learn about the benefits of Corelight DNS logs, and how Splunk Enterprise Security can reach a new level of functionality through integration with...
Whether you’re a footsoldier or a tier-one analyst, a commanding view helps you outsmart and outlast adversaries. With Corelight, you can hold the...
RSA 2020 is fast approaching. The speaker sessions seem to be of high quality overall, but here are the 12 talks you should consider attending.