Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Detecting GnuTLS CVE-2020-13777 using Zeek Find a technical description of the bug, how it can be detected in network traffic, and how a short Zeek script can detect vulnerable servers. Johanna Amann Jun 11, 2020