CONTACT US
forrester wave report 2023

Close your ransomware case with Open NDR

SEE HOW

Download our free guide to find hidden attackers.

Find hidden attackers with Open NDR

SEE HOW

cloud-network

Corelight announces cloud enrichment for AWS, GCP, and Azure

READ MORE

corelight partner programe guide

Corelight's partner program

VIEW PROGRAM

glossary-icon

10 Considerations for Implementing an XDR Strategy

READ NOW

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

g2-medal-best-support-spring-2024

Network Detection and Response

SUPPORT OVERVIEW

 

Corelight Enables File Analysis with YARA Integration

Integration Improves Visibility, Enhances Threat Detection, and Drives Security Tool Consolidation

SAN FRANCISCO – Dec. 11, 2024 — Corelight, the fastest growing provider of network detection and response (NDR) solutions, delivers static file analysis capabilities powered by YARA integration, an open-source tool used to scan files and data streams for patterns associated with malware. With YARA rules now available in Corelight sensors, security teams are able to add static file analysis as a critical element of their network monitoring capabilities. Integrating YARA rules into Corelight Open NDR increases the overall efficiency of the security operations center (SOC) by eliminating the need for manual processes or additional tools to extract and analyze files, detect malware, and create an alert when malware is detected.

Malicious files continue to be a pervasive threat vector across enterprise networks with more than 6 billion malware attacks in 2023.1 Furthermore, an increasingly complicated stack of standalone security tools creates additional challenges for security teams trying to stay ahead of the influx of threats. This integration provides a deeper level of inspection to detect emerging threats and helps security teams rationalize and consolidate their toolset in the process.

“Corelight accelerates SOC workflows and enables the deepest levels of network detection to accelerate incident response activity and deliver efficiency,” said Vijit Nair, vice president of product, Corelight. “We continue our tradition of integrating industry-leading open source capabilities like YARA and Suricata to complement Corelight’s foundational technology based on Zeek, providing the most comprehensive evidence for teams to utilize within their operations.”

With this integration, security teams using Corelight can now deploy YARA rules for pattern-based detection to quickly analyze large volumes of files to aid malware identification, proactive threat hunting via indicators of compromise (IOCs), and automated malware analysis. According to Gartner® report “Emerging Tech: Top Use Cases in Preemptive Cyber Defense,” “Prevention, faster detection and deeper forensics improve security ops and reduce mean time to respond (MTTR). Preemptive tech cuts investigation time by 65%, offering instant forensic data for swift action.”2 Detections from Yara rules for identifying suspicious, malicious content or latent content or binary artifacts in files are an example of a method used in the predictive threat intelligence use case.

Corelight’s integration of YARA rules helps security teams to:

  • Close Visibility Gaps: Static file analysis with YARA rules provides file inspection at the network layer, closing a gap on devices where endpoint technology isn’t deployed.
  • Facilitate Proactive Threat Hunting: By leveraging static analysis, security teams can proactively identify potential threats before they execute, enabling a more proactive approach to threat hunting and incident response.
  • Create Customized Rules: YARA rules can be customized to fit specific organizational needs, allowing for tailored threat detection based on unique threat landscapes and security requirements.
  • Improve Incident Response: Quick identification of malicious files through static analysis streamlines the incident response process, enabling faster remediation and reducing potential damage from attacks.

To learn more about how Corelight and YARA are improving SOC efficiency, please visit https://corelight.com/blog/yara-integration.

About Corelight
Corelight transforms network and cloud activity into evidence that security teams use to proactively hunt for threats, accelerate response to incidents, gain complete network visibility and create powerful analytics. Corelight’s global customers include Fortune 500 companies, major government agencies, and large universities. Based in San Francisco, Corelight is an open-core security company founded by the creators of Zeek®, the widely-used network security technology. For more information, visit https://corelight.com or follow @corelight_inc.

1SonicWall 2024 Mid-Year Threat Report

2Gartner, Emerging Tech: Top Use Cases in Preemptive Cyber Defense, By Lawrence Pingree, Carl Manion, Luis Castillo, Isy Bangurah, Walker Black, John Collins, 13 August 2024

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Recent Posts