↧
Has APT1 Been Eating My Porridge?
Retro AnalysisThanks to the Mandiant APT1 report appendices, we have a wealth of threat data we can use to flush APT1 out of the network. In this installment, we’ll take a look at how to accomplish...
View ArticleSpear Phish Detection and Response
Can’t Patch a UserEvery security professional and IT administrator knows the importance of keeping computing assets patched against known vulnerabilities. “Scheduled maintenance outages” and “Patch...
View ArticleProcessing IOCs in the StealthWatch System
Analyzing the PastOne of the most challenging (and frustrating) components in the never-ending cycle of white hats chasing black hats is the length of time it takes to build methods of detecting new...
View Article