Effective Threat-Hunting Queries in a Redacted World

Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers’ infrastructure.

Go to Source
Author: Chad Anderson

You may also like...