Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside the SectorCERT Denmark Attack: How Corelight Helped Stop a Coordinated Campaign

Corelight CEO Brian Dye recounts how Corelight supported SectorCERT—an alliance of energy companies in Denmark—during one of the most advanced attack sequences he’s seen. The coordinated campaign targeted a shared firewall vulnerability across nearly a dozen organizations. Corelight provided the critical visibility and detection that helped defenders stop the first wave—and stay ahead of a second, modified attack just weeks later. The incident became a model of collaboration and response across national infrastructure.

How Corelight Helped a Customer Reject a $10M Ransomware Demand

Corelight CEO Brian Dye shares the high-stakes story of a customer under a $10 million ransomware attack. The attackers claimed to have stolen sensitive IP—but with Corelight, the customer had the network visibility to verify exactly what was taken. The result? They confirmed the stolen data was limited and non-critical, enabling them to confidently deny the ransom demand. This powerful story illustrates the difference between “I think” and “I know”—and how that clarity can drive executive confidence, legal defensibility, and real-world savings.

Corelight's Vincent Stoffer on Why Enterprises Can't Rely Only on Endpoint Security

The cybersecurity industry's heavy reliance on endpoint detection and response tools has created significant vulnerabilities, particularly around IoT devices and operational technology that cannot be monitored using traditional security tools, according to Vincent Stoffer, field CTO at Corelight. This growing attack surface, combined with sophisticated threat actors who exploit any available entry point, has pushed organizations to reevaluate their security strategies and consider more comprehensive network monitoring approaches.

SOC Visibility Triad: R.I.P. or Rebirth?

The SOC Visibility Triad was defined by Dr. Anton Chuvakin at Gartner almost 10 years ago when the cloud was in its early stages. As the shift to highly dynamic, multicloud environments became mainstream over the last few years, some have argued that the “Triad” should be put to rest since it no longer can ensure the visibility needed to maintain effective security across these modern architectures.

Open NDR static file analysis powered by YARA

Enhance utility of evidence Identify malicious files from network activity and derive the right context without increasing false positives Improve detection coverage Analyze large volumes of files for detecting threats that can be missed by EDR Drive tool consolidation Consolidate tools and eliminate the need for file extraction, storage and custom scripts.

How Corelight's ServiceNow integration speeds response

See how the integration between Corelight's Open NDR platform and ServiceNow allows analysts to send specified detections to ServiceNow, enabling efficient case management for in-depth analysis. Send selected detections with contextual information to ServiceNow with a few clicks, and easily jump from ServiceNow to view detection-related details in Corelight, resulting in faster time to case resolution/MTTR.

The Importance of NDR Detection-in-Depth

Detection engineering has evolved into an art, contributing to the success rates of endpoint and network detection and response tooling capabilities. Used to effectively counter the increasing complexity of today’s cyber threat actors, high-fidelity detections can help an organization discover threats earlier, neutralizing them before further damage can occur.