Another day, another DCE/RPC RCE
The Corelight Labs team investigates CVE-2022-26809 and open-sources a Zeek package that detects attempts and successful exploitation in unencrypted...
The Corelight Labs team investigates CVE-2022-26809 and open-sources a Zeek package that detects attempts and successful exploitation in unencrypted...
We demonstrate how the visibility of network traffic passing between pods and containers within the K8s network can be utilized to detect a log4j...
This post explores the need, different approaches and pros and cons of monitor traffic in Kubernetes environments.
Corelight just shipped our latest software release (v24) which includes a brand new addition to our Encrypted Traffic Collection: VPN Insights.
Prioritizing alerts just got a little easier for SOC teams with Corelight's integration with Tenable.
CISA recently released a set of playbooks for the Federal Civilian Executive Branch (FCEB). Here's why we are blogging about this.
What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that?
Learn how to detect the CVE-2021-42292 exploit, which relies on Excel fetching a second Excel file, through behavioral tricks.
Corelight offers a new core recommendation - Dtection.io - for customers using its Suricata integration.