Home News Effective Threat-Hunting Queries in a Redacted World

    Effective Threat-Hunting Queries in a Redacted World

    17
    0



    Chad Anderson, senior safety researcher for DomainTools, demonstrates how seemingly disparate items of infrastructure info can type good fingerprints for monitoring cyberattackers’ infrastructure.



    Source link