Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Episode 1: Typhoon Season with Vincent Stoffer

Richard Bejtlich sits down with Vince Stoffer, Corelight's Field CTO, to dive into the recent wave of cyberattacks attributed to Chinese threat actors, known as "Typhoon" groups. Vince unpacks the distinctions between "Volt Typhoon," targeting critical infrastructure sectors such as energy and transportation, and "Salt Typhoon," which is infiltrating telecommunications networks for espionage. The conversation explores the evolving tactics, techniques, and procedures (TTPs) used by these groups, including their exploitation of zero-day vulnerabilities and outdated infrastructure.

Detecting EDR Evasion with Corelight Open NDR

This video walks through how Corelight Open NDR helps security teams detect EDR evasion by delivering complete visibility across all network assets. Using a real-world scenario, the video demonstrates how anomaly detection uncovers suspicious activity, mapping events directly to MITRE ATT&CK techniques. The investigation process highlights the detection of an anomalous user agent, which ultimately reveals a Linux privilege escalation toolkit.

The Network Detection & Response (NDR) platform trusted by top cybersecurity teams

Proven in the world’s most demanding environments, Corelight’s Open NDR Platform illuminates network blind spots and uncovers hidden threats to disrupt attacks before they escalate. Get unified visibility, multi-layered AI-driven threat detections, AI-powered triage workflows, and industry-leading forensic capabilities in one unified platform. Elite defense, now within reach of the enterprise.

Unveiling Intrusions: Corelight NDR and CrowdStrike EDR in Action

Adversaries are deliberately attacking devices that are difficult to monitor with EDR. In this video, you’ll see how you can use Corelight’s Network Detection & Response (NDR) inside of CrowdStrike Falcon to paint the full picture of an intrusion. NDR gives defenders the visibility they need to find intrusions on unmanaged devices of any type.

How NDR contributes to visibility and security in the cloud

Join Youssef Agharmine, the technical security expert from Corelight for a live webinar focusing on how to extend visibility and identify attacks during the transition to cloud infrastructure. What you’ll learn: This will be a technical presentation—we’ll be demoing Corelight in the cloud!

How To Threat Hunt in Encrypted Network Traffic

Threat hunters need evidence to find adversaries. Networks offer a broad and reliable source of evidence, helping hunters make sense of movement across their environment via an immutable record of activity. Traffic, unlike endpoints, cannot lie. But the rise of encryption complicates this picture, especially where decryption isn't an optimal or possible solution.

Advanced attacks: EDR alone is not sufficient

Your best defense against advanced attacks is your network. SOC teams need comprehensive network data to defend against attacks. Corelight combines industry-leading Zeek network metadata, multi-layered detections, packet capture (PCAP), and file analysis (YARA) for the best approach to network-driven defense. Disrupt attacks, address gaps within your security stack, and reduce risk to your organization with Corelight's NDR solution.

How Corelight Deployed Zeek at 20 Sites in 4 Months After 7-Year Stalemate

Corelight CEO Brian Dye shares the story of the company’s first multi-million-dollar customer—a team that had spent seven years trying to operationalize Zeek using another commercial vendor. With Corelight, they were up and running across 20 sites in just four months. This story highlights the foundational value Corelight provides: a hardened, scalable Zeek deployment that unlocks visibility, incident response, and threat hunting at scale.

How an Energy Customer Used FERC 887 Compliance to Boost Security

Corelight CEO Brian Dye shares how a customer in the energy sector turned a mandatory compliance project into a broader security win. Brought in to meet FERC 87 monitoring requirements for bulk electric systems, Corelight also helped advance their security operations. The customer used the compliance mandate not just to check a box—but to gain meaningful visibility and security value from day one.