Corelight

@corelight@infosec.exchange
213 Followers
182 Following
497 Posts
Corelight transforms network/cloud activity into evidence so defenders can stay ahead of ever-changing attacks.

We’re thrilled to announce that Corelight has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response! 🎉

To us, this recognition reflects our capabilities in executing and delivering a comprehensive vision for NDR, with deep visibility and the ability to detect advanced threats. Our focus on structured network evidence, multi-layered detection, and integrating AI into SOC workflows continues to set us apart.

Curious about what’s behind this recognition? Head to the full blog to learn more about how we’re helping organizations detect, investigate, and respond to threats faster and more accurately.

🔗 https://corelight.com/blog/gartner-ndr-leader-2025?utm_source=msdtn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=gartner-magic-quadrant&utm_content=SSI

#GartnerMagicQuadrant #NDR #NetworkSecurity

Malware can be stealthy and hard to detect. Here’s how network visibility is a crucial piece to staying vigilant and keeping it out of your network. 👇
Distributed Denial-of-Service (DDoS) attacks can bring down your systems. Here’s how early detection can protect against them. 👇

As organizations move to multi-cloud environments, securing network traffic becomes increasingly complex. Corelight’s Open NDR offers the deep visibility needed to spot threats across both cloud-native and on-prem traffic. The real challenge isn’t just detecting threats, but understanding them in context.

In the cloud, visibility is critical for staying ahead of attackers, ensuring compliance, and maintaining a proactive security posture.

🔗 Learn how Open NDR empowers security teams to protect cloud environments with our free guide: https://go.corelight.com/a-cloud-architects-guide-to-network-security?utm_source=msdtn&utm_medium=organic-social&utm_campaign=ebook&utm_adgroup=architect-guide&utm_content=SSI

#CloudSecurity #NDR #NetworkSecurity #NetworkVisibility

Get The eBook: A Cloud Architect's Guide to Network Security

This eBook addresses significant security challenges multi-cloud environments present to security teams.

Recent state-sponsored campaigns like Volt and Salt Typhoon demonstrate how traditional endpoint detection and response (EDR) tools alone aren’t enough to detect and stop highly sophisticated threats.

Attackers are exploiting vulnerabilities in unmanaged network appliances and using "living-off-the-land" tactics, blending into legitimate network traffic to avoid detection.

The solution? Shifting focus from just endpoint protection to comprehensive network visibility and detection. Network visibility is critical to identifying these threats early and preventing further damage.

🔗 Read the full blog to discover how attackers are bypassing EDR and why network-based detection is crucial for closing the gaps: https://corelight.com/blog/volt-typhoon-salt-typhoon-edr?utm_source=mstdn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=typhoon-season&utm_content=SSI

Volt Typhoon & Salt Typhoon Attackers Are Evading EDR: What Can You Do? | Corelight

Learn how network visibility and detection are critical to closing security gaps and detecting these attacks.

Living off the land attacks often go unnoticed, but they could be lurking in your network. Let’s dive into why visibility is so important when it comes to detection. 👇

At SCinet 2024, Eldon Koyle, Principal Technical Marketing Engineer at Corelight, was threat hunting using data from Corelight sensors in one of the fastest, most open research networks ever created.

👉 His key takeaway? Context is everything.

In high-speed environments, security teams can’t rely solely on alerts. They need data that paints a clearer picture of any suspicious behavior on the network. Enriched network logs provide critical visibility, helping threat hunters connect the dots and make more informed decisions in real time.

With vast amounts of data moving across the network, how do you ensure your security team has the visibility needed to identify and assess threats before they escalate? Read Eldon’s full insight his latest blog 🔗 https://corelight.com/blog/threat-hunting-at-scinet-24?utm_source=msdtn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=SCinet2024&utm_content=quote

#Cybersecurity #NetworkSecurity #SC24 #ThreatHunting

Threat Hunting at SCinet: Challenges & Insights | Corelight

SCinet’s massive, open network creates unique security challenges. Here's a recap of my experience threat hunting in this high-speed environment.

Cloud-based AI models like DeepSeek offer convenience, but they introduce privacy concerns—especially when handling sensitive network data.

Instead, run DeepSeek locally. Learn how to use Zeek®️ and the DeepSeek-r1 model with Ollama and Open WebUI to securely and efficiently summarize Zeek package contents, without exposing your data to the cloud.

Keep your investigations in-house and benefit from: 🔐 Enhanced security—no cloud exposure ⚡️ Improved efficiency in Zeek summarization with local AI processing ⚙️ Full control and privacy when working with network monitoring scripts

Take control of your data and investigations, all while improving efficiency.

🔗 Read more on the blog: https://corelight.com/blog/secure-deepseek-zeek-analysis?utm_source=mstdn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=deepseek&utm_content=SSI

#Zeek #NetworkSecurity #DeepSeek #AI #OpenSource

Running DeepSeek AI privately using open-source software | Corelight

Learn how to run DeepSeek AI locally with Ollama and Open WebUI for secure Zeek script analysis.

Cyberattacks targeting critical infrastructure are rapidly evolving.

"The energy sector is a major target, and these attacks can cripple organizations if we don't improve our visibility." 💬 Gregory Bell, Corelight Co-founder

In the latest episode of CrowdStrike's Adversary Universe podcast, Greg discusses the challenges of securing critical devices across OT and IT environments in the energy sector, where solutions like EDR aren’t always feasible. These vulnerabilities make prime targets for sophisticated attacks like Volt Typhoon and Salt Typhoon, emphasizing the critical need for complete network visibility to stay one step ahead.

Network visibility is crucial for early threat detection, whether that involves hidden vulnerabilities or sophisticated attackers operating under the radar.

👉 Listen to the full episode with Greg Bell, Adam Meyers, and Cristian R.: https://crowdstrike.podbean.com/e/putting-a-spotlight-on-energy-sector-threats-with-corelights-greg-bell/

Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell | Adversary Universe Podcast

Cyberattacks targeting critical infrastructure have made more headlines in recent years, sparking concern about how these systems are protected. Adversaries are taking aim at older technologies that are both essential to everyday life and difficult to secure. Our guest for this episode is Greg Bell, chief strategy officer at Corelight. Before he co-founded the network security firm, Greg spent most of his career working in the National Laboratory system, part of the U.S. Department of Energy. He brings his perspective and expertise to this conversation about energy sector threats, the adversaries behind them, and the unique challenges that utility organizations face in detecting and defending against cyberattacks. There is a scary side to energy sector threats — but there is also an optimistic side. Adam, Cristian, and Greg discuss everything from the history of critical infrastructure threats to the attacks they’re seeing today, the complications of securing energy systems, and collaborative efforts to improve defense. Key to these efforts are partnerships like the one between CrowdStrike and Corelight, which work together to improve network threat detection and response. Come for the comprehensive look at energy sector threats and stay for Cristian’s energy sector puns in this episode of the Adversary Universe podcast.

Corelight is excited to announce the launch of our AI-powered Investigator #SaaS NDR platform on AWS in the Middle East! 🌟

This release is designed to ensure data residency, sovereignty and compliance while providing real-time visibility and advanced detections powered by AI.

Here’s what you can expect 📷
→ Local data residency with lower operational costs
→ Improved performance and scalability
→ Comprehensive visibility across hybrid environments → Custom detections for stealthy cloud attacks
→ Faster incident response with detailed evidence

Check out the full details here 📷https://go.corelight.com/ai-powered-ndr-saas-platform-aws?utm_source=mstdn&utm_medium=organic-social&utm_campaign=launch&utm_adgroup=awsuae&utm_content=ssi… #NDR #CloudSecurity #AI #DataSovereignty #AWSMiddleEast

Corelight Launches AI-Powered NDR SaaS Platform on AWS

Corelight Launches AI-Powered NDR SaaS Platform on AWS Middle East that ensures Data Residency, Sovereignty, and Compliance.