Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Network Security Monitoring, a requirement for Managed Service Providers? Over the last six months, a variety of MSPs were compromised. In this post, I aim to get a better understanding of those incidents. Richard Bejtlich May 21, 2019