The Cybersecurity Defenders Podcast

#251 - Defender Fridays: Hunting Chinese State Actors with David Burkett from Corelight

Sep 26, 2025
David Burkett, a skilled Cloud Detection Engineer and Security Architect at Corelight, shares his extensive knowledge on hunting state-sponsored cyber threats, particularly focusing on recent CISA advisories regarding Chinese state actors. He discusses innovative techniques like using Zeek for detecting edge device exploitation, SSH fingerprinting, and tracking unusual traffic patterns. David also highlights the importance of correlating network telemetry with endpoint data to boost detection effectiveness and emphasizes the need for continuous learning and collaboration in the cybersecurity community.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

EDR Pressure Shifts Adversary Tradeoffs

  • EDR success has pushed adversaries to avoid endpoints and rely more on network-level techniques.
  • This shift makes network detection and baselining management traffic increasingly valuable.
ADVICE

Baseline Management Protocols Immediately

  • Baseline management protocols like TACACS on port 49 and alert on outbound traffic.
  • Treat any unexpected external TACACS connections as a high-priority anomaly.
ADVICE

Hunt For PCAP Exfiltration

  • Search Zeek/Con logs and SMB/files logs for PCAP or other captures being transferred outbound.
  • Investigate any PCAP file transfers since they rarely should leave your network in the clear.
Get the Snipd Podcast app to discover more snips from this episode
Get the app