Detecting the New CallStranger UPnP Vulnerability With Zeek

By Ryan Victory, Corelight Security Researcher On June 8, Yunus Çadırcı, a cybersecurity senior manager at EY Turkey released a whitepaper and proof of concept code repository for a newly discovered vulnerability in the Universal Plug an… Continue reading Detecting the New CallStranger UPnP Vulnerability With Zeek

Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi]

Dr. Ali Hadi, a professor of cybersecurity, answers our questions and describes the Zeek framework as LEGO bricks for network security.
The post Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi] appeared first on Securi… Continue reading Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi]

Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates unusual activity and network anomalies.
The post Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale appeared first on Se… Continue reading Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

Troubleshooting NSM Virtualization Problems with Linux and VirtualBox

I spent a chunk of the day troubleshooting a network security monitoring (NSM) problem. I thought I would share the problem and my investigation in the hopes that it might help others. The specifics are probably less important than the general approach… Continue reading Troubleshooting NSM Virtualization Problems with Linux and VirtualBox