Ben Reardon - Corelight Labs Researcher The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the ... Read more »
Industry
Finding SUNBURST backdoor with Zeek logs & Corelight
John Gamble, Director of Product Marketing, Corelight ------------------------------------------- UPDATE 12-16-20: Corelight Resources WEBCAST RECORDING - Finding SolarWinds backdoors with Zeek, Suricata & Corelight - watch hereWEBCAST ... Read more »
Who’s your fridge talking to at night?
By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new from Corelight, and I’d like to share ... Read more »
The election is six months away. Now is the time to instrument election infrastructure.
Editor's Note: Richard recently shared his thoughts on our blog which are now included in an article contributed to StateTech on why the overarching role of the network and election infrastructure is worthy of a deep assessment right now. ... Read more »
Using Corelight and Zeek to support remote workers
By Richard Bejtlich, Principal Security Strategist, Corelight Due to the tragic Covid-19 pandemic, as we are all experiencing first hand, most governments and health officials are either mandating or encouraging those who can work from home to do ... Read more »