Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shielding Against the Most Recent Fortinet Vulnerability

During a red team assessment for a client, Charles Fol and Dany Bach from LEXFO, discovered a heap overflow bug in Fortigate’s SSL VPN that can be exploited to achieve remote code execution on Fortigate instances. This vulnerability is reachable without authentication, and can be used to execute arbitrary code on vulnerable systems, which could lead to a complete compromise of the system.

Domain and IP intelligence with alphaMountain and LimaCharlie

With how quickly threat actors move, your network and security teams need additional data to triangulate security investigations and ensure your users are safe. Learn how you can leverage LimaCharlie's integration with alphaMountain to provide domain and IP intelligence feeds for cyber protection based on continuously trained AI models. alphaMountain helps security architects and analysts make better, faster decisions about the risks posed by a host on the internet.

Lessons Learned Deploying Corelight in the Black Hat Asia NOC

Last month, Corelight had the distinct privilege of joining Cisco, NetWitness, Palo Alto Networks, Arista, and our internet service provider, MyRepublic, to provide availability and network security overwatch to the Black Hat Asia network in Singapore. This marked our first appearance in the Black Hat Network Operations Center (NOC).

Better Together: Stopping API Attacks with Salt and AWS WAF

APIs power today’s digital economy and enable organizations to succeed in their business innovation efforts. Because every company’s APIs are unique, so are its security gaps, which bad actors will inevitably try to exploit. Only through rich context and deep behavioral analysis can these attackers be stopped. Many of the APIs that enable today’s applications and business services live and breathe within the Amazon Web Service (AWS) ecosystem.

5 Best Practices for Implementing Secure and Effective SD-WAN

Corporate networks are rapidly becoming more complex and distributed. With the growth of cloud computing, remote work, mobile and Internet of Things (IoT), companies have users and IT assets everywhere, requiring connectivity. Software-defined WAN (SD-WAN) provides the ability to implement a secure, high-performance corporate WAN on top of existing networks. However, SD-WAN infrastructures must be carefully designed and implemented to provide full value to the organization.

More Network Security Monitoring Tools Doesn't Mean More Visibility

Network security monitoring tools are a critical component of any IT security toolkit. These tools help protect your network from online threats by looking for weaknesses and potential dangers in your organization's digital properties. But as digital ecosystems have expanded into the cloud, remote locations, and across geographies – the number of monitoring tools has skyrocketed.

Celebrating CrowdStrike's New Network Detection Service "Powered by Corelight"

Several months ago, we announced that our strategic alliance partner CrowdStrike decided to use our Open NDR technology across its professional services portfolio. This wasn’t just a meaningful validation for us—it was also a testament to the importance CrowdStrike places in arming its world-class Services teams with the technology that can best ensure the protection of its customers.

Globee Disruptor Awards names Forward Enterprise 2023 Silver Winner

The Globee Awards for Disruptors recognizes and celebrates organizations and individuals who have significantly contributed to disruptive innovation across various industries. These awards acknowledge the trailblazers who have challenged the status quo, introduced groundbreaking ideas, and transformed traditional practices through their disruptive approaches.

AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - the Time to Prepare Is Now

Malicious code is not difficult to find these days, even for OT, IoT and other embedded and unmanaged devices. Public exploit proofs-of-concept (PoCs) for IP camera vulnerabilities are routinely used by Chinese APTs, popular building automation devices are targeted by hacktivists and unpatched routers used for Russian espionage.