Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
cybersecurity Next-Generation SIEM: Corelight is the Data of Choice Learn how Zeek’s metadata approach can help focus patching efforts for the SSH “Terrapin” attack. Todd Wingler May 7, 2024