Threat Post - Effective Threat-Hunting Queries in a Redacted World
Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers' infrastructure.
from Threatpost https://threatpost.com/effective-threat-hunting-queries/168864/
from Threatpost https://threatpost.com/effective-threat-hunting-queries/168864/
Comments
Post a Comment