Corelight

@corelight@infosec.exchange
213 Followers
182 Following
497 Posts
Corelight transforms network/cloud activity into evidence so defenders can stay ahead of ever-changing attacks.

We’re thrilled to announce that Corelight has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response! 🎉

To us, this recognition reflects our capabilities in executing and delivering a comprehensive vision for NDR, with deep visibility and the ability to detect advanced threats. Our focus on structured network evidence, multi-layered detection, and integrating AI into SOC workflows continues to set us apart.

Curious about what’s behind this recognition? Head to the full blog to learn more about how we’re helping organizations detect, investigate, and respond to threats faster and more accurately.

🔗 https://corelight.com/blog/gartner-ndr-leader-2025?utm_source=msdtn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=gartner-magic-quadrant&utm_content=SSI

#GartnerMagicQuadrant #NDR #NetworkSecurity

Malware can be stealthy and hard to detect. Here’s how network visibility is a crucial piece to staying vigilant and keeping it out of your network. 👇
Distributed Denial-of-Service (DDoS) attacks can bring down your systems. Here’s how early detection can protect against them. 👇

As organizations move to multi-cloud environments, securing network traffic becomes increasingly complex. Corelight’s Open NDR offers the deep visibility needed to spot threats across both cloud-native and on-prem traffic. The real challenge isn’t just detecting threats, but understanding them in context.

In the cloud, visibility is critical for staying ahead of attackers, ensuring compliance, and maintaining a proactive security posture.

🔗 Learn how Open NDR empowers security teams to protect cloud environments with our free guide: https://go.corelight.com/a-cloud-architects-guide-to-network-security?utm_source=msdtn&utm_medium=organic-social&utm_campaign=ebook&utm_adgroup=architect-guide&utm_content=SSI

#CloudSecurity #NDR #NetworkSecurity #NetworkVisibility

Get The eBook: A Cloud Architect's Guide to Network Security

This eBook addresses significant security challenges multi-cloud environments present to security teams.

Recent state-sponsored campaigns like Volt and Salt Typhoon demonstrate how traditional endpoint detection and response (EDR) tools alone aren’t enough to detect and stop highly sophisticated threats.

Attackers are exploiting vulnerabilities in unmanaged network appliances and using "living-off-the-land" tactics, blending into legitimate network traffic to avoid detection.

The solution? Shifting focus from just endpoint protection to comprehensive network visibility and detection. Network visibility is critical to identifying these threats early and preventing further damage.

🔗 Read the full blog to discover how attackers are bypassing EDR and why network-based detection is crucial for closing the gaps: https://corelight.com/blog/volt-typhoon-salt-typhoon-edr?utm_source=mstdn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=typhoon-season&utm_content=SSI

Volt Typhoon & Salt Typhoon Attackers Are Evading EDR: What Can You Do? | Corelight

Learn how network visibility and detection are critical to closing security gaps and detecting these attacks.

Living off the land attacks often go unnoticed, but they could be lurking in your network. Let’s dive into why visibility is so important when it comes to detection. 👇

At SCinet 2024, Eldon Koyle, Principal Technical Marketing Engineer at Corelight, was threat hunting using data from Corelight sensors in one of the fastest, most open research networks ever created.

👉 His key takeaway? Context is everything.

In high-speed environments, security teams can’t rely solely on alerts. They need data that paints a clearer picture of any suspicious behavior on the network. Enriched network logs provide critical visibility, helping threat hunters connect the dots and make more informed decisions in real time.

With vast amounts of data moving across the network, how do you ensure your security team has the visibility needed to identify and assess threats before they escalate? Read Eldon’s full insight his latest blog 🔗 https://corelight.com/blog/threat-hunting-at-scinet-24?utm_source=msdtn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=SCinet2024&utm_content=quote

#Cybersecurity #NetworkSecurity #SC24 #ThreatHunting

Threat Hunting at SCinet: Challenges & Insights | Corelight

SCinet’s massive, open network creates unique security challenges. Here's a recap of my experience threat hunting in this high-speed environment.

Cloud-based AI models like DeepSeek offer convenience, but they introduce privacy concerns—especially when handling sensitive network data.

Instead, run DeepSeek locally. Learn how to use Zeek®️ and the DeepSeek-r1 model with Ollama and Open WebUI to securely and efficiently summarize Zeek package contents, without exposing your data to the cloud.

Keep your investigations in-house and benefit from: 🔐 Enhanced security—no cloud exposure ⚡️ Improved efficiency in Zeek summarization with local AI processing ⚙️ Full control and privacy when working with network monitoring scripts

Take control of your data and investigations, all while improving efficiency.

🔗 Read more on the blog: https://corelight.com/blog/secure-deepseek-zeek-analysis?utm_source=mstdn&utm_medium=organic-social&utm_campaign=blog&utm_adgroup=deepseek&utm_content=SSI

#Zeek #NetworkSecurity #DeepSeek #AI #OpenSource

Running DeepSeek AI privately using open-source software | Corelight

Learn how to run DeepSeek AI locally with Ollama and Open WebUI for secure Zeek script analysis.

Corelight is excited to announce the launch of our AI-powered Investigator #SaaS NDR platform on AWS in the Middle East! 🌟

This release is designed to ensure data residency, sovereignty and compliance while providing real-time visibility and advanced detections powered by AI.

Here’s what you can expect 📷
→ Local data residency with lower operational costs
→ Improved performance and scalability
→ Comprehensive visibility across hybrid environments → Custom detections for stealthy cloud attacks
→ Faster incident response with detailed evidence

Check out the full details here 📷https://go.corelight.com/ai-powered-ndr-saas-platform-aws?utm_source=mstdn&utm_medium=organic-social&utm_campaign=launch&utm_adgroup=awsuae&utm_content=ssi… #NDR #CloudSecurity #AI #DataSovereignty #AWSMiddleEast

Corelight Launches AI-Powered NDR SaaS Platform on AWS

Corelight Launches AI-Powered NDR SaaS Platform on AWS Middle East that ensures Data Residency, Sovereignty, and Compliance.

🔍 DNS investigations taking too long?

For one federal agency, investigations into DNS events were complex and slow. By integrating Corelight’s network detection platform, they consolidated data across systems, enabling faster, more accurate decision-making. The result? 75% faster DNS investigations.

Corelight doesn’t just aggregate data; it provides clear, actionable insights that save time and improve response.

Want to see how the power of Corelight's network data can improve your agency's security operations? 👉 https://corelight.com/solutions/verticals/federal?utm_source=mstdn&utm_medium=organic-social&utm_campaign=casestudy&utm_adgroup=dnsinvestigations&utm_content=carousel

#Cybersecurity #DNS #SOC #ThreatHunting #PublicSector

Federal | Corelight

Defending federal networks with Open NDR from Corelight