Featured Black Hat Europe 2025: Lessons from the NOC The antidote to security erosion is monitoring your traffic. I’ve learned you have to "peep those packets" to catch the leaks and make response a... Mark Overholser Feb 27, 2026
Zeek Examining aspects of encrypted traffic through Zeek logs In this post I will use Zeek logs to demonstrate alternative ways to analyze encrypted HTTP traffic. Richard Bejtlich Feb 19, 2019