Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
ransomware Using Corelight to Identify Ransomware Blast Radius Learn how Corelight’s Open NDR products and platforms help SOC teams identify ransomware blast radius. Chris Brown Sep 29, 2023
cybersecurity Detecting Storm-0558 using Corelight evidence Learn how to leverage Corelight evidence to detect and analyze activity related to Storm-0558. Chris Brown Aug 2, 2023