Malware continues to be a significant threat to organizations, causing damage on its own or as the tip of the spear for compromised-credential attacks. Threat researchers and analysts can leverage threat data and relational context to find and shut down new malware attacks before they cause damage. Where do you get started and what tools do you have in your tool belt to tackle this problem? This session will walk through an end-to-end methodology for investigating a newly-discovered malware sample, beginning with a file hash, and ending with intelligence-led use cases developed directly from research.
→Visit our website: [ Ссылка ]
→Follow us on Twitter: [ Ссылка ]
→Like us on Facebook: [ Ссылка ]
#SecurityWeekly #Malware #ThreatHunting
Ещё видео!