Source |
IT Security Guru |
Identifiant |
410578 |
Date de publication |
2017-09-21 09:26:21 (vue: 2017-09-21 09:26:21) |
Titre |
Utilising Threat Hunting techniques to detect and defend against malware attacks |
Texte |
Since the outbreak of Petya, there have been many articles analysing and dissecting the malware, to determine its purpose, and who is ultimately responsible. Reverse engineering and malware analysis to conduct post incident analysis has provided the basis for the conclusions drawn in these features. Instead, Anomali, in collaboration with threat hunting experts Vector8, viewed ...
|
Envoyé |
Oui |
Condensat |
against analysing analysis anomali articles attacks basis been collaboration conclusions conduct defend detect determine dissecting drawn engineering experts features has have hunting incident instead its malware many outbreak petya post provided purpose responsible reverse since techniques these threat ultimately utilising vector8 viewed who |
Tags |
|
Stories |
|
Notes |
★★★★★
|
Move |
|