In this video, we are explaining what Yara rules are and how to use them in practice. We will look at two examples, explain where they fit in the cybersecurity ecosystem, and how you can write your own.
📒 Show Notes 📒
⏰ Markers
0:00 Preview
Simply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.
---------------------------------------------------------------------------------
🤝 Social Media 🤝
LinkedIn: [ Ссылка ]
Twitter: [ Ссылка ]
YouTube: [ Ссылка ]
Discord: [ Ссылка ]
Twitch: [ Ссылка ]
---------------------------------------------------------------------------------
🔥 My Curated Free Cyber Resources: [ Ссылка ]
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
🙌🏼 Donate 🙌🏼
Like the channel and got value? Please consider supporting the channel
[ Ссылка ]
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
😎 Merch 😎
👉🏼 SimplyCyber Branded Gear: [ Ссылка ]
---------------------------------------------------------------------------------
🎥 My livestreams are produced through StreamYard. Get a $10 credit using my referral link below if you ever upgrade to pro plan.
STREAMYARD $10 REFERRAL - [ Ссылка ]
Disclaimer: All content reflects the thoughts and opinions of Gerald Auger and the speakers themselves, and are not affiliated with the employer of those individuals unless explicitly stated.
What are Yara Rules (and How Cybersecurity Analysts Use Them)
Теги
cybersecurityinformation securitycareercybersecurityinfoseccyber securitycareer growthcyber for beginnersblue teamred teamcareer developmentcyber jobcybersecurity jobsentry level cybersecurityentry levelno degreecyber careerssimplycybersimply cybercyber security for beginnersget into cyber securitycybersecurity for beginnerscybersecurity careerscareers in cybersecuritysoc analystyara rulesyarasignature detectionmalware