Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Corelight Announces Cloud Enrichment for AWS, GCP, and Azure

This week, I’m excited to announce Cloud Enrichment for AWS, GCP, and Azure. These enhancements are designed to accelerate incident response and unlock threat hunting capabilities by automatically combining the insights of your cloud network with the native control plane data from your cloud service provider.

Firmware Vulnerabilities Run Rampant in Cellular Routers

The current state of OT/IOT security is being repainted with a new coat of risk. The shade of color? Cellular routers and the vulnerabilities within firmware. In our new report with Finite State, our joint research explores the risks organizations face within the software supply chains of OT/IoT routers. Hardware has firmware – operational software – within its memory components.

The Importance of Firewall Logs

A firewall is a crucial network security element that forms a barrier between an internal network (e.g. a company's intranet) and external networks (e.g. the Internet). A firewall's main objective is to regulate and monitor incoming and outgoing network traffic based on prescribed rules. This helps prevent unauthorized access, safeguards sensitive data, and mitigates security risks.

ICS Malware 'FrostyGoop/BUSTLEBERM': Insights Others Missed

In the last few weeks, there have been a few announcements made about a new malware threat known as FrostyGoop or BUSTLEBERM (as it was originally tracked by Mandiant). It is being recognized as the first custom malware to integrate Modbus for the purpose of causing physical damage. An associated incident has been reported where the malware was used to disrupt heating in Ukrainian homes in the context of a Russian cyberattack.

Decoding Networks: The Revolutionary Impact of Mapping Tools

In today's hyper-connected world, unraveling the complex tapestry of relationships within various systems has become crucial. Enter the network mapping tool - a game-changing innovation empowering professionals across industries to visualize, dissect, and enhance intricate networks.

Common Types of Network Devices and Their Functions

Modern IT infrastructure is comprised of various interconnected network components that make communication and resource sharing possible throughout your organization. Whether securing sensitive data, facilitating collaboration, or simply ensuring uninterrupted access, a network of devices is at play—and the elements of these devices are critical to a business’s successful operation.

The Current State of Ransomware Risk

Ransomware risk is top of mind for citizens and CISOs alike. From the board room to the room known as the ‘SOC’, everyone is feeling the pain of disruption. Being locked out of a system and forced back to pen and paper is shocking to our working lives. Too often, it is delaying a much-needed surgery or forcing manual intervention where a digital avenue was easy and efficient. But the effects of ransomware don’t appear to be going anywhere soon.

Advanced Network Device Scanning Techniques with Total Network Inventory (TNI)

In network management, the ability to efficiently scan network for devices is crucial for maintaining security, optimizing performance, and ensuring effective asset management. Total Network Inventory (TNI) offers a range of methods to scan network devices.