CONTACT US

Whitepaper

How to threat hunt with Open NDR + MITRE ATT&CK®

Get Corelight's exclusive Threat Hunting Guide

Access the report

This comprehensive field manual shows you how to to use network telemetry to hunt for:

  • Spearphishing attacks
  • Automated exfiltration
  • Lateral movement

Plus, more than twenty additional adversary tactics and techniques.

You will learn:

  • Why threat hunting matters and why network data is key
  • How to find dozens of adversary tactics and techniques
  • How to use Corelight and Zeek evidence for hunting

Screenshot 2024-11-28 at 16.14.38

 

 

corelight-logo-white

Corelight provides security teams with network evidence so they can protect the world's most critical organizations and companies.