Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Corelight Hunting at Black Hat Asia 2025: There’s a First Time for Everything Six hours a day of network threat hunting while jet-lagged? Yup, count me in. See how Corelight data helped me spot risks on the Black Hat Asia... Jason Wood May 19, 2025
network detection response How to threat hunt for Volt Typhoon using NDR Learn how to use NDR to detect Volt Typhoon attacks that evade EDR, closing blindspots to stop intrusions before they become breaches. Jason Wood May 12, 2025