Source |
The Register |
Identifiant |
8288287 |
Date de publication |
2022-12-06 15:30:10 (vue: 2022-12-06 16:05:41) |
Titre |
Want to detect Cobalt Strike on the network? Look to process memory |
Texte |
Security analysts have tools to spot hard-to-find threat, Unit 42 says Enterprise security pros can detect malware samples in environments that incorporate the highly evasive Cobalt Strike attack code by analyzing artifacts in process memory, according to researchers with Palo Alto Networks' Unit 42 threat intelligence unit.… |
Envoyé |
Oui |
Condensat |
according alto analysts analyzing artifacts attack can cobalt code detect enterprise environments evasive find hard have highly incorporate intelligence look malware memory network networks palo process pros researchers samples says security spot strike threat tools unit want |
Tags |
Malware
Threat
|
Stories |
|
Notes |
★★★
|
Move |
|