Ben Reardon - Corelight Labs Researcher The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the ... Read more »
Encrypted Traffic
The light shines even brighter: Updates to Corelight’s Encrypted Traffic Collection
By Vince Stoffer, Senior Director, Product Management, Corelight With Corelight’s latest software release, v19, we are excited to announce the expansion of our Encrypted Traffic Collection (ETC). The ETC was introduced in late 2019, but as a ... Read more »
Light in the darkness: New Corelight Encrypted Traffic Collection
By Vince Stoffer, Senior Director, Product Management, Corelight This week’s launch of version 18 of our software features the Encrypted Traffic Collection, our first collection of a series of detections and data enrichments created by the ... Read more »
Introducing the Corelight SSH Inference package
By Anthony Kasza, Security Researcher, Corelight Labs Corelight has recently released a new package, focusing on SSH inferences, as part of our Encrypted Traffic Collection. The package installs on sensors with a few clicks and provides network ... Read more »
The sun sets on TLS 1.0
By Johanna Amann, Software Engineer, Corelight Editor’s note: This post is the result of the author’s work at the International Computer Science Institute where she works as a senior researcher. In the last months, the major web browsers ... Read more »