Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Episode 6 - Detecting DNS Covert Channels in the Wild (Part 2)

In Episode 6 of Corelight DefeNDRs, we delve deeper into the fascinating world of DNS covert channels with Vern Paxson, our chief scientist and co-founder. Continuing from our previous discussion, Vern shares his insights on techniques developed to detect these stealthy channels utilized by intruders to evade security measures. We explore the innovative approach of leveraging time series analysis of DNS lookups, how to distinguish benign traffic from potential threats, and the real-world implications of our findings across significant datasets.

7 Smart Ways to Improve Security Monitoring With Automation

Security can feel like a constant background concern for anyone who runs a startup or manages product delivery. One missed alert or late response can cause serious damage. Manual monitoring is no longer effective, as it doesn't scale well. Workers get tired, which causes logs to pile up and signals to be easily missed. That is why many businesses are turning to automation.

Why One-Time Vulnerability Scans Aren't Enough

A single vulnerability scan provides a tempting snapshot of security health. Too many companies rely on such periodic checks for compliance and some semblance of risk assessment. This, however, leads to an extremely dangerous illusion of security. Modern digital environments, as well as threat actors, move at speeds that are much too high for a static, point-in-time evaluation. Treating cybersecurity as an exercise in box-ticking leaves gaps that adversaries can use.

Supply Chain Security-4 Weak Spots Worth Fixing Now, Not Later

Supply chains are marvels of coordination, but they are also deeply human creations, which means assumptions sneak in, shortcuts feel sensible, and comfort zones harden over time. The smartest organizations are not the most paranoid ones. They are the most curious. They ask where things might wobble, not because they expect disaster, but because they respect complexity. The four vulnerabilities below are common, understandable, and manageable, which is precisely why they deserve attention now, while choices are still choices and not apologies.

Why Traditional Threat Detection Is Failing Security Teams

As attack surfaces continue to expand, many security teams are finding that traditional detection methods can’t keep up. In this clip, the discussion centers on why legacy security tools struggle in modern environments — from the growing complexity of networks to the sheer volume of alerts teams are expected to investigate. When alerts are handled manually and without sufficient context, it becomes difficult to understand which threats are most critical and how quickly to respond.

Behavioral Threat Detection: Identifying Attacks That Blend into Normal Activity

Some attacks are easy to spot. Others aren’t. In many cases, nothing obviously breaks or crashes, and no malware ever shows up. Nothing looks wrong at first. Access appears normal, and systems continue to run as usual. Modern attacks are challenging to detect because attackers often use the same tools and access paths as legitimate users. In addition, attackers remain low-key and use access that appears normal.