Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Corelight Back in the Black Hat NOC: A familiar mission, a new crew What stood out this year was the sheer volume of insecure application traffic. Corelight uncovered an unsecured corporate messaging app leaking... Blake Cahen Sep 29, 2025