Spotting Log4j traffic in Kubernetes environments
We demonstrate how the visibility of network traffic passing between pods and containers within the K8s network can be utilized to detect a log4j...
We demonstrate how the visibility of network traffic passing between pods and containers within the K8s network can be utilized to detect a log4j...
This post explores the need, different approaches and pros and cons of monitor traffic in Kubernetes environments.
Corelight just shipped our latest software release (v24) which includes a brand new addition to our Encrypted Traffic Collection: VPN Insights.
Prioritizing alerts just got a little easier for SOC teams with Corelight's integration with Tenable.
CISA recently released a set of playbooks for the Federal Civilian Executive Branch (FCEB). Here's why we are blogging about this.
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
Learn how to detect the CVE-2021-42292 exploit, which relies on Excel fetching a second Excel file, through behavioral tricks.
Corelight offers a new core recommendation - Dtection.io - for customers using its Suricata integration.
Corelight launches software version 22, which introduces a transformative new security product, Smart PCAP, and also enables threat detection in the...