Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Corelight’s recent contributions to open-source Bro I want to take the opportunity here to talk about a few of our more recent contributions to open-source Zeek (formerly Bro). Robin Sommer Aug 9, 2018