Effective Threat-Hunting Queries in a Redacted World
Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers' infrastructure.
from Threatpost Effective Threat-Hunting Queries in a Redacted Worldhttps://ift.tt/3zfOLsD
from Threatpost Effective Threat-Hunting Queries in a Redacted Worldhttps://ift.tt/3zfOLsD
Comments
Post a Comment