By Ryan Victory, Corelight Security Researcher On June 8, Yunus Çadırcı, a cybersecurity senior manager at EY Turkey released a whitepaper and proof of concept code repository for a newly discovered vulnerability in the Universal Plug and Play ... Read more »
network security
The high ground
By Charles Strauss, Senior Brand Copywriter, Corelight Introducing Corelight’s new story + the value of NTA From the Greek Acropolis to the Space Race, defenders have sought the high ground. Up there, you can see the whole landscape. You know ... Read more »
Corelight ECS mapping: Unified Zeek data for more efficient analytics
By Ed Smith, Senior Product Marketing Manager, Corelight In addition to other great news we’ve recently shared, I’m pleased to announce that Corelight sensors now support the Elastic Common Schema (ECS) via our Corelight ECS Mapping. If you’re ... Read more »
New Corelight app for Splunk: Making network-based threat hunting easier
By Ed Smith, Senior Product Marketing Manager, Corelight Want to use Zeek (formerly Bro) network data in Splunk ES, but don’t know how to start or where to look? Need to quickly narrow down Zeek logs from a mountain, to a hill, to a ... Read more »
Securing the Corelight Sensor
By Steve Smoot, VP Customer Success @ Corelight Have you ever considered how security tools can be a source of risk? They process untrusted data 24/7, have access to sensitive flows, and (like everything on the Internet) can be exploited if not ... Read more »