Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Empowering your LLMs: Unlocking cybersecurity queries with Open WebUI knowledge bases

In the rapidly evolving landscape of large language models (LLMs), the ability to access and synthesize vast amounts of information is paramount. While LLMs excel at generating creative text and understanding complex prompts, their knowledge is often limited to the data used during their training. This is where knowledge bases (a.k.a.

Data driven detection: Corelight's approach to AI-powered NDR

The Gordian knot of any detection strategy is knowing that two conflicting ideas are both true. On one hand, every SOC needs as much accurate detection coverage as they can get to find and disrupt attacks. On the other, the attackers you REALLY care about will find a way to bypass those detections so you need the ground truth of the attacker behavior on your network. The only answer is to have both: the absolute best data and the broadest detection suite possible on top of it.

How EDR evasion is changing threat detection

Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) have become integral to modern SecOps architecture and threat detection capabilities. However, the urgency of the situation is clear—attackers are deploying increasingly sophisticated techniques to bypass threat detection centered on these systems.

How Can Building a Real-Time Asset Inventory Strengthen Your Threat Detection?

Organizations often lack a complete, up-to-date inventory of their IT assets – servers, endpoints, cloud instances, IoT devices, and more – creating security blind spots. Attackers exploit these unknown devices and outdated systems. Without knowing “what you have, you can’t protect it.” Poor asset visibility dramatically increases risk: you’re slower to spot breaches, can’t prioritize defenses, and may fail compliance checks.

How Automated Vulnerability Scanners Can Improve Your Threat Detection

Web applications are central to how modern businesses operate, driving customer engagement, managing critical workflows, and enabling seamless digital experiences. But as applications become more dynamic and distributed, their attack surfaces grow more complex, and harder to defend. According to the 2025 Verizon Data Breach Investigations Report, 20% of confirmed breaches began with the exploitation of known vulnerabilities, a 34% increase over the previous year.

Corelight Named Leader and Outperformer in the 2025 GigaOm Radar for Network Detection and Response (NDR) Solutions

We’re thrilled to announce that Corelight has been ranked a Leader and Outperformer in the 2025 GigaOm Radar for Network Detection and Response (NDR) Solutions. NDR solutions are essential for continuous real-time monitoring and analysis of network traffic. Corelight's Open NDR excels at detecting known and unknown threats across on-premises, cloud, and hybrid environments, leveraging cutting-edge technologies such as artificial intelligence, machine learning, and behavioral analytics.

What Does ITDR Stand For? Understanding Identity Threat Detection and Response

Identity threat detection and response (ITDR) is a cybersecurity discipline focused on detecting, investigating, and responding to threats targeting identity systems like Active Directory (AD) and Entra ID, identity providers (IdPs), and authentication mechanisms. It enhances traditional identity and access management (IAM) by introducing threat intelligence, behavioral analysis, and automated response capabilities to mitigate identity-based attacks.

How Corelight Deployed Zeek at 20 Sites in 4 Months After 7-Year Stalemate

Corelight CEO Brian Dye shares the story of the company’s first multi-million-dollar customer—a team that had spent seven years trying to operationalize Zeek using another commercial vendor. With Corelight, they were up and running across 20 sites in just four months. This story highlights the foundational value Corelight provides: a hardened, scalable Zeek deployment that unlocks visibility, incident response, and threat hunting at scale.

How an Energy Customer Used FERC 887 Compliance to Boost Security

Corelight CEO Brian Dye shares how a customer in the energy sector turned a mandatory compliance project into a broader security win. Brought in to meet FERC 87 monitoring requirements for bulk electric systems, Corelight also helped advance their security operations. The customer used the compliance mandate not just to check a box—but to gain meaningful visibility and security value from day one.

Inside the SectorCERT Denmark Attack: How Corelight Helped Stop a Coordinated Campaign

Corelight CEO Brian Dye recounts how Corelight supported SectorCERT—an alliance of energy companies in Denmark—during one of the most advanced attack sequences he’s seen. The coordinated campaign targeted a shared firewall vulnerability across nearly a dozen organizations. Corelight provided the critical visibility and detection that helped defenders stop the first wave—and stay ahead of a second, modified attack just weeks later. The incident became a model of collaboration and response across national infrastructure.