Source |
LogPoint |
Identifiant |
8301502 |
Date de publication |
2023-01-16 12:43:43 (vue: 2023-01-16 14:06:45) |
Titre |
Hive hunter: The tools and tactics to track down Hive ransomware |
Texte |
>By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation and mitigation best practicesFinal thoughtsTL;DRA comparatively new ransomware, Hive is around one-and-a-half years old in the wild, but it is already among the top ransomware threats in the industry. Threat actors have been using Hive to target a variety of [...]
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
>by actors already among analysishunting around been best bhatta but comparatively dev down factstechnical half have hive hunter: industry logpointinvestigation logpointremediation mitigation new old one practicesfinal rabindra ransomware researchcontentsfast response security tactics target thoughtstl;dra threat threats tools top track using variety wild years |
Tags |
Ransomware
Threat
|
Stories |
|
Move |
|