The app for independent voices

Thanks for the shout out this week Zack Allen !

Detection strategies emerge when the behavioral or contextual information becomes a critical decision point for finding threat actor activity. Atomic detections are akin to the idea of the malicious domain. Still, other behaviors, such as malicious cronjobs, cURLing an unknown binary on a user session, or adding malicious email forwarding rules, all make sense to alert in isolation.”

Det. Eng. Weekly #126 - live laugh logs
Aug 27
at
4:34 PM
Relevant people

Log in or sign up

Join the most interesting and insightful discussions.