Featured Inside the mind of a cybersecurity threat hunter part 3: hunting for adversaries moving inside your network Learn how to use Corelight’s rich network telemetry in CrowdStrike’s Next-Gen SIEM to expose defense evasion and lateral movement inside your network. Allen Marin Dec 22, 2025
Zeek Detecting the new CallStranger UPnP vulnerability with Zeek By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways. Ryan Victory Jun 10, 2020