Viruses
epub |eng | 2024-01-11 | Author:Seidl, David; [Seidl, David]

( Category: Viruses April 9,2024 )
pdf | | 2024-03-04 | Author:Jennifer L. Bayuk

( Category: Viruses March 24,2024 )
epub |eng | 2022-03-15 | Author:David Routin & Simon Thoores & Samuel Rossier

As usual, the detection strategy could rely on Sigma and be completed with a frequency/aggregation approach to match the maximum number of potential threats. You may also consider reading the ...
( Category: Viruses March 9,2024 )
epub |eng | 2022-02-15 | Author:Chad Maurice & Jeremy Thompson & William Copeland

Finally, the team turned to the success factors, MOPs, and MOEs. MOPs were defined by each section and supplied to the team lead for review. The team lead sent some ...
( Category: Viruses February 28,2024 )
epub |eng | 2022-01-15 | Author:Yuri Diogenes & Dr. Erdal Ozkaya

Use of clever tricks The use of clever tricks can help you defend your network against Nmap scanning. The Nmap scan tool, just like many other probe tools, relies on ...
( Category: Viruses January 20,2024 )
pdf | | 2023-10-27 | Author:Crawley, Kim;

( Category: Viruses January 20,2024 )
epub |eng | 2023-01-15 | Author:Kunal Sehgal & Nikolaos Thymianis

Detective controls These controls provide visibility into security breaches or any malicious or suspicious activity. Detective security controls function during the progression as well as after the occurrence of the ...
( Category: Viruses January 16,2024 )
epub |eng | 2023-09-11 | Author:Borg, Omar

Chapter 7.1: Incident Response and Remediation with Yara Rules In this expanded chapter, we will delve into the integration of Yara rules into your incident response and remediation processes using ...
( Category: Viruses January 8,2024 )
epub |eng | 2022-01-15 | Author:Kyle Wilhoit & Joseph Opacki

Hybrid collection Hybrid collection utilizes a combination of the passive data collection capabilities of an organization and active collection disciplines in the sense that it requires human interaction from the ...
( Category: Viruses January 6,2024 )
pdf | | 2024-10-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong

( Category: Viruses December 4,2023 )
epub |eng | 2022-11-15 | Author:John Paul Mueller

Exploit: An exploit is a special piece of code or carefully crafted data that takes advantage of a bug, error, or behavior (intended or not) of an application, operating system, ...
( Category: Viruses November 30,2023 )
epub |eng | 2023-11-15 | Author:Paul Huijbregts & Joe Anich & Justen Graves

Email notifications Here, you can create email notifications for alerts or vulnerabilities. This is best used selectively; use cases can be for VIP machines or other high-value assets that you ...
( Category: Viruses November 27,2023 )
epub |eng | 2022-11-15 | Author:Mark Birch

Objdump This is a similar tool to Readelf in that it can display the contents of operating system files on Unix-like operating systems. Strace Strace is a tool for tracing ...
( Category: Viruses November 25,2023 )
epub, pdf |eng | 2024-11-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong

Decrypting the Command-and-Control Communications As in the previous chapter, one of the most important properties of the malware we’ll want to reverse engineer is its encrypted communication with the command-and-control ...
( Category: Viruses November 13,2023 )
epub |eng | 2023-11-15 | Author:Megan Roddie & Jason Deyalsingh & Gary J. Katz

Message Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: 2023-01-14 03:29:21.683 ProcessGuid: {71ccf5f5-2191-63c2-7303-000000001e00} ProcessId: 12852 PipeName: \RemCom_stdinCQHe2366530 Image: C:\Windows\HRrcwYpJ.exe User: NT AUTHORITY\SYSTEM Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: ...
( Category: Viruses November 3,2023 )