Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th…
By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity…
By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep…
Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to…
Today I wanted to continue the series on using LD_PRELOAD. In today’s post we are going to use LD_PRELOAD to…
A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack.
Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…
Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things. …
Tripwire‘s September 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Apple, and various Linux distributions. Up first…
Amnesty International revealed the existence of Linux and macOS variants of FinSpy, a commercially available spy suite used extensively by…