Featured Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 19, 2025
Zeek Extensibility as a Guiding Principle To us, extensibility is not an afterthought that we try to tuck on in a few release cycles. It permeates the way we think about network monitoring. Christian Kreibich Dec 6, 2017