<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Bright Ideas Blog</title>
    <link>https://corelight.com/blog</link>
    <description>Welcome to the Corelight Bright Ideas Blog. We help organizations gain world-class visibility into their network traffic to help detect and prevent attacks.</description>
    <language>en</language>
    <pubDate>Fri, 03 Apr 2026 19:37:53 GMT</pubDate>
    <dc:date>2026-04-03T19:37:53Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Corelight and Microsoft: A Smarter Way to Fight Alert Fatigue | Corelight</title>
      <link>https://corelight.com/blog/microsoft-defender-integration-reduces-alert-fatigue</link>
      <description>&lt;p&gt;For SOC teams, the battle against cyber threats can feel like trying to solve a 3D jigsaw puzzle in a bouncy house with missing pieces and a timer blasting every few seconds. Despite the increase in security spending, most teams still struggle with inefficient investigations, &lt;a href="https://corelight.com/resources/glossary/alert-fatigue"&gt;alert fatigue&lt;/a&gt;, and the non-stop guessing game of prioritizing threats. That’s why we’re excited about our &lt;a href="https://corelight.com/products/alliances/microsoft?hsLang=en"&gt;latest integration&lt;/a&gt; with Microsoft Security that we hope will help address these persistently common challenges.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;For SOC teams, the battle against cyber threats can feel like trying to solve a 3D jigsaw puzzle in a bouncy house with missing pieces and a timer blasting every few seconds. Despite the increase in security spending, most teams still struggle with inefficient investigations, &lt;a href="https://corelight.com/resources/glossary/alert-fatigue"&gt;alert fatigue&lt;/a&gt;, and the non-stop guessing game of prioritizing threats. That’s why we’re excited about our &lt;a href="https://corelight.com/products/alliances/microsoft?hsLang=en"&gt;latest integration&lt;/a&gt; with Microsoft Security that we hope will help address these persistently common challenges.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fmicrosoft-defender-integration-reduces-alert-fatigue&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>network detection response</category>
      <category>network security</category>
      <category>microsoft</category>
      <category>featured</category>
      <category>defender</category>
      <pubDate>Mon, 30 Mar 2026 20:27:58 GMT</pubDate>
      <guid>https://corelight.com/blog/microsoft-defender-integration-reduces-alert-fatigue</guid>
      <dc:date>2026-03-30T20:27:58Z</dc:date>
      <dc:creator>Allen Marin</dc:creator>
    </item>
    <item>
      <title>Fueling Cisco XDR with Corelight high-fidelity network evidence | Corelight</title>
      <link>https://corelight.com/blog/cisco-xdr-investigator-integration</link>
      <description>&lt;p&gt;From hunting threats to solving complex problems to coding on a couch, adventures in the Black Hat NOC (Network Operations Center) are always interesting. Over the last few months and several shows, I’ve had the privilege of working with one of the other NOC partners, Cisco, to design and test &lt;a href="https://corelight.com/hubfs/resources/joint-solution-briefs/corelight-cisco-xdr-jsb.pdf"&gt;our first integration&lt;/a&gt; between &lt;a href="https://corelight.com/products/investigator"&gt;Corelight Investigator&lt;/a&gt; and &lt;a href="https://www.cisco.com/site/us/en/products/security/xdr/index.html"&gt;Cisco XDR&lt;/a&gt;. While we worked on this project virtually for several weeks, the passion for building new things, more caffeine than I care to admit, and a comfy couch brought this special integration together.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;From hunting threats to solving complex problems to coding on a couch, adventures in the Black Hat NOC (Network Operations Center) are always interesting. Over the last few months and several shows, I’ve had the privilege of working with one of the other NOC partners, Cisco, to design and test &lt;a href="https://corelight.com/hubfs/resources/joint-solution-briefs/corelight-cisco-xdr-jsb.pdf"&gt;our first integration&lt;/a&gt; between &lt;a href="https://corelight.com/products/investigator"&gt;Corelight Investigator&lt;/a&gt; and &lt;a href="https://www.cisco.com/site/us/en/products/security/xdr/index.html"&gt;Cisco XDR&lt;/a&gt;. While we worked on this project virtually for several weeks, the passion for building new things, more caffeine than I care to admit, and a comfy couch brought this special integration together.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fcisco-xdr-investigator-integration&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>network detection response</category>
      <category>SOC</category>
      <category>Cisco</category>
      <category>featured</category>
      <category>XDR</category>
      <category>Corelight Investigator</category>
      <pubDate>Thu, 19 Mar 2026 15:46:51 GMT</pubDate>
      <guid>https://corelight.com/blog/cisco-xdr-investigator-integration</guid>
      <dc:date>2026-03-19T15:46:51Z</dc:date>
      <dc:creator>Cody Spooner</dc:creator>
    </item>
    <item>
      <title>Transforming the SOC with Corelight Agentic Triage | Corelight</title>
      <link>https://corelight.com/blog/agentic-triage-soc-transformation</link>
      <description>&lt;h2&gt;Introduction: The dawn of the AI SOC era&lt;/h2&gt; 
&lt;p&gt;The cybersecurity landscape has fundamentally shifted in the last several years. Adversaries are no longer just using AI to draft phishing emails; they're deploying autonomous AI agents capable of executing end-to-end attack chains, from initial reconnaissance through lateral movement and data exfiltration. Anthropic's&lt;sup&gt;&lt;a href="#anthropic"&gt;1&lt;/a&gt;&lt;/sup&gt; analysis of recent incidents indicates a rapid acceleration in attacker adoption of agentic workflows, dramatically shortening the time between initial access and impact. IBM X-Force&lt;sup&gt;&lt;a href="#ibm"&gt;2&lt;/a&gt;&lt;/sup&gt; data confirms AI-assisted phishing attacks have surged by 1,265%, while a 2025 Gartner survey&lt;sup&gt;&lt;a href="#gartner"&gt;3&lt;/a&gt;&lt;/sup&gt; found that 62% of organizations experienced deepfake attacks involving social engineering automation. The era of AI-versus-AI security operations has arrived, and defenders must respond in kind.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;Introduction: The dawn of the AI SOC era&lt;/h2&gt; 
&lt;p&gt;The cybersecurity landscape has fundamentally shifted in the last several years. Adversaries are no longer just using AI to draft phishing emails; they're deploying autonomous AI agents capable of executing end-to-end attack chains, from initial reconnaissance through lateral movement and data exfiltration. Anthropic's&lt;sup&gt;&lt;a href="#anthropic"&gt;1&lt;/a&gt;&lt;/sup&gt; analysis of recent incidents indicates a rapid acceleration in attacker adoption of agentic workflows, dramatically shortening the time between initial access and impact. IBM X-Force&lt;sup&gt;&lt;a href="#ibm"&gt;2&lt;/a&gt;&lt;/sup&gt; data confirms AI-assisted phishing attacks have surged by 1,265%, while a 2025 Gartner survey&lt;sup&gt;&lt;a href="#gartner"&gt;3&lt;/a&gt;&lt;/sup&gt; found that 62% of organizations experienced deepfake attacks involving social engineering automation. The era of AI-versus-AI security operations has arrived, and defenders must respond in kind.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fagentic-triage-soc-transformation&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>network detection response</category>
      <category>SOC</category>
      <category>featured</category>
      <category>AI</category>
      <category>agentic triage</category>
      <pubDate>Wed, 18 Mar 2026 11:45:00 GMT</pubDate>
      <guid>https://corelight.com/blog/agentic-triage-soc-transformation</guid>
      <dc:date>2026-03-18T11:45:00Z</dc:date>
      <dc:creator>Muzzafer Pasha</dc:creator>
    </item>
    <item>
      <title>Why geopolitical tensions should raise cyber awareness | Corelight</title>
      <link>https://corelight.com/blog/geopolitical-tensions-cybersecurity</link>
      <description>&lt;p&gt;When geopolitical tensions rise, cybersecurity quickly becomes part of the public conversation.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;When geopolitical tensions rise, cybersecurity quickly becomes part of the public conversation.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fgeopolitical-tensions-cybersecurity&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>network security</category>
      <category>cybersecurity</category>
      <category>featured</category>
      <category>anomaly detection</category>
      <category>Geopolitics</category>
      <category>Critical Infrastructure</category>
      <pubDate>Mon, 16 Mar 2026 21:05:06 GMT</pubDate>
      <guid>https://corelight.com/blog/geopolitical-tensions-cybersecurity</guid>
      <dc:date>2026-03-16T21:05:06Z</dc:date>
      <dc:creator>Vince Stoffer</dc:creator>
    </item>
    <item>
      <title>Black Hat Europe 2025: Lessons from the NOC | Corelight</title>
      <link>https://corelight.com/blog/black-hat-europe-2025-noc-lessons</link>
      <description>&lt;p&gt;With the holiday season all wrapped up (pun definitely intended), I finally have time to sit down and digest what we saw in the network traffic at &lt;a href="https://blackhat.com/eu-25/noc.html"&gt;Black Hat Europe 2025&lt;/a&gt; while working alongside the other Network Operations Center (NOC) partners: Arista, Cisco, Jamf, and Palo Alto Networks. As usual, there is a mix of the expected, a dash of the unexpected, and some lessons for newcomers and greybeards alike. Let’s get into it.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;With the holiday season all wrapped up (pun definitely intended), I finally have time to sit down and digest what we saw in the network traffic at &lt;a href="https://blackhat.com/eu-25/noc.html"&gt;Black Hat Europe 2025&lt;/a&gt; while working alongside the other Network Operations Center (NOC) partners: Arista, Cisco, Jamf, and Palo Alto Networks. As usual, there is a mix of the expected, a dash of the unexpected, and some lessons for newcomers and greybeards alike. Let’s get into it.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fblack-hat-europe-2025-noc-lessons&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SOC</category>
      <category>threat hunter</category>
      <category>threat hunting</category>
      <category>featured</category>
      <category>Conference</category>
      <pubDate>Fri, 27 Feb 2026 14:57:33 GMT</pubDate>
      <guid>https://corelight.com/blog/black-hat-europe-2025-noc-lessons</guid>
      <dc:date>2026-02-27T14:57:33Z</dc:date>
      <dc:creator>Mark Overholser</dc:creator>
    </item>
    <item>
      <title>Black Hat Europe 2025: Threat Hunting With Agentic AI | Corelight</title>
      <link>https://corelight.com/blog/black-hat-europe-2025-agentic-ai</link>
      <description>&lt;h2&gt;POST bodies: a hunter’s goldmine&lt;/h2&gt; 
&lt;p&gt;Working at the Black Hat Network Operations Center (NOC) as a data scientist makes me a bit of an outlier (pun intended) among network engineers and hard-core threat hunters. Thanks to the great work of my colleagues and the other NOC partners that I’ve worked alongside over the years (Arista, Cisco, Jamf, and Palo Alto Networks), I have been able to focus on triaging alerts and developing tailored modeling approaches for identifying anomalies using Corelight logs to defend Black Hat’s well-defined yet challenging conference environment.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;POST bodies: a hunter’s goldmine&lt;/h2&gt; 
&lt;p&gt;Working at the Black Hat Network Operations Center (NOC) as a data scientist makes me a bit of an outlier (pun intended) among network engineers and hard-core threat hunters. Thanks to the great work of my colleagues and the other NOC partners that I’ve worked alongside over the years (Arista, Cisco, Jamf, and Palo Alto Networks), I have been able to focus on triaging alerts and developing tailored modeling approaches for identifying anomalies using Corelight logs to defend Black Hat’s well-defined yet challenging conference environment.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fblack-hat-europe-2025-agentic-ai&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SOC</category>
      <category>threat hunter</category>
      <category>threat hunting</category>
      <category>featured</category>
      <category>Conference</category>
      <pubDate>Fri, 27 Feb 2026 14:57:02 GMT</pubDate>
      <guid>https://corelight.com/blog/black-hat-europe-2025-agentic-ai</guid>
      <dc:date>2026-02-27T14:57:02Z</dc:date>
      <dc:creator>Nacho Arnaldo</dc:creator>
    </item>
    <item>
      <title>Black Hat Europe 2025: Going Into the Fire | Corelight</title>
      <link>https://corelight.com/blog/black-hat-europe-2025-into-the-fire</link>
      <description>&lt;p&gt;Of course no analogy is ever perfect, but when I talk to friends and family about what I do in the field of IT security, I like to compare it to firefighting and the three key roles that make fighting fires possible. First, there are scientists who conduct research on fire spread and fire-retardant materials. In IT security, the scientists are the academics working on the building blocks that are used to secure systems, such as encryption.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Of course no analogy is ever perfect, but when I talk to friends and family about what I do in the field of IT security, I like to compare it to firefighting and the three key roles that make fighting fires possible. First, there are scientists who conduct research on fire spread and fire-retardant materials. In IT security, the scientists are the academics working on the building blocks that are used to secure systems, such as encryption.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fblack-hat-europe-2025-into-the-fire&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SOC</category>
      <category>threat hunter</category>
      <category>threat hunting</category>
      <category>featured</category>
      <category>Conference</category>
      <pubDate>Thu, 26 Feb 2026 15:38:13 GMT</pubDate>
      <guid>https://corelight.com/blog/black-hat-europe-2025-into-the-fire</guid>
      <dc:date>2026-02-26T15:38:13Z</dc:date>
      <dc:creator>Jan Grashoefer</dc:creator>
    </item>
    <item>
      <title>Black Hat Europe 2025: Finding a Needle in a Needle Stack | Corelight</title>
      <link>https://corelight.com/blog/black-hat-europe-2025-needle-in-a-needle-stack</link>
      <description>&lt;p&gt;There is a saying you will hear tossed around by Black Hat veterans, and even in the presentations: “&lt;a href="https://corelight.com/resources/glossary/threat-hunting"&gt;threat hunting&lt;/a&gt; on the Black Hat network is like trying to find a needle in a needle stack”. Still, knowing this did little to prepare me for how unique of an opportunity it is to work in the Black Hat Network Operations Center (NOC). I've been working for Corelight for a little over two years, and previous to that I worked &lt;a href="https://corelight.com/resources/glossary/incident-response"&gt;incident response&lt;/a&gt; for the US government.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;There is a saying you will hear tossed around by Black Hat veterans, and even in the presentations: “&lt;a href="https://corelight.com/resources/glossary/threat-hunting"&gt;threat hunting&lt;/a&gt; on the Black Hat network is like trying to find a needle in a needle stack”. Still, knowing this did little to prepare me for how unique of an opportunity it is to work in the Black Hat Network Operations Center (NOC). I've been working for Corelight for a little over two years, and previous to that I worked &lt;a href="https://corelight.com/resources/glossary/incident-response"&gt;incident response&lt;/a&gt; for the US government.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fblack-hat-europe-2025-needle-in-a-needle-stack&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SOC</category>
      <category>threat hunter</category>
      <category>threat hunting</category>
      <category>featured</category>
      <category>Conference</category>
      <pubDate>Thu, 26 Feb 2026 15:27:42 GMT</pubDate>
      <guid>https://corelight.com/blog/black-hat-europe-2025-needle-in-a-needle-stack</guid>
      <dc:date>2026-02-26T15:27:42Z</dc:date>
      <dc:creator>Preston Dizmang</dc:creator>
    </item>
    <item>
      <title>Corelight at SC25: A laboratory for securing the fastest conference network | Corelight</title>
      <link>https://corelight.com/blog/scinet-sc25-security-recap</link>
      <description>&lt;p&gt;I’ve worked as a threat hunter &lt;a href="https://corelight.com/blog/author/mark-overholser"&gt;in several Black Hat Security Conference Network Operations Centers (NOCs)&lt;/a&gt; across the globe. So I didn’t expect to be surprised by much when signing on to be a part of the NOC for &lt;a href="https://sc25.supercomputing.org/scinet/"&gt;SCinet&lt;/a&gt;—a conference that has the “fastest conference network in the world.” And yet I was surprised by just how diverse the SCinet NOC team was, how collaborative the environment was, and how much we were able to achieve with automation in such a short amount of time. I learned quite a bit from the experience, particularly about the importance of experimentation in security, so I wanted to share a few takeaways from my time in the SCinet NOC that I hope you can learn from too!&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;I’ve worked as a threat hunter &lt;a href="https://corelight.com/blog/author/mark-overholser"&gt;in several Black Hat Security Conference Network Operations Centers (NOCs)&lt;/a&gt; across the globe. So I didn’t expect to be surprised by much when signing on to be a part of the NOC for &lt;a href="https://sc25.supercomputing.org/scinet/"&gt;SCinet&lt;/a&gt;—a conference that has the “fastest conference network in the world.” And yet I was surprised by just how diverse the SCinet NOC team was, how collaborative the environment was, and how much we were able to achieve with automation in such a short amount of time. I learned quite a bit from the experience, particularly about the importance of experimentation in security, so I wanted to share a few takeaways from my time in the SCinet NOC that I hope you can learn from too!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fscinet-sc25-security-recap&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SOC</category>
      <category>threat hunter</category>
      <category>threat hunting</category>
      <category>featured</category>
      <category>Conference</category>
      <pubDate>Tue, 17 Feb 2026 23:18:38 GMT</pubDate>
      <guid>https://corelight.com/blog/scinet-sc25-security-recap</guid>
      <dc:date>2026-02-17T23:18:38Z</dc:date>
      <dc:creator>Mark Overholser</dc:creator>
    </item>
    <item>
      <title>Detecting Lateral Movement &amp; Evasion Inside Your Network | Corelight</title>
      <link>https://corelight.com/blog/detecting-lateral-movement-and-evasion</link>
      <description>&lt;p&gt;Welcome back to our threat hunting series with Corelight and CrowdStrike. In our previous posts, we armed you with techniques to &lt;a href="https://corelight.com/blog/confronting-initial-access-techniques"&gt;spot adversaries during Initial Access&lt;/a&gt; and how they establish &lt;a href="https://corelight.com/blog/newsroom/news/persistence-techniques"&gt;Persistence to maintain their foothold&lt;/a&gt;. Now, we're diving into the shadowy dance of Defense Evasion and Lateral Movement.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Welcome back to our threat hunting series with Corelight and CrowdStrike. In our previous posts, we armed you with techniques to &lt;a href="https://corelight.com/blog/confronting-initial-access-techniques"&gt;spot adversaries during Initial Access&lt;/a&gt; and how they establish &lt;a href="https://corelight.com/blog/newsroom/news/persistence-techniques"&gt;Persistence to maintain their foothold&lt;/a&gt;. Now, we're diving into the shadowy dance of Defense Evasion and Lateral Movement.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8645105&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fcorelight.com%2Fblog%2Fdetecting-lateral-movement-and-evasion&amp;amp;bu=https%253A%252F%252Fcorelight.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Corelight</category>
      <category>SIEM</category>
      <category>threat hunting</category>
      <category>Crowdstrike</category>
      <category>Lateral Movement</category>
      <category>featured</category>
      <pubDate>Mon, 22 Dec 2025 18:28:53 GMT</pubDate>
      <guid>https://corelight.com/blog/detecting-lateral-movement-and-evasion</guid>
      <dc:date>2025-12-22T18:28:53Z</dc:date>
      <dc:creator>Allen Marin</dc:creator>
    </item>
  </channel>
</rss>
