Threat hunting with Yara: Dealing with wildcard hexadecimal patterns
Guest Post: Learn how to use Yara’s native hexadecimal pattern definition features to create fast rules with fewer false positives and no alarming nested loops.
Guest Post: Learn how to use Yara’s native hexadecimal pattern definition features to create fast rules with fewer false positives and no alarming nested loops.
Guest Post: Learn how to use Yara’s math module and min/max functions to measure distance between patterns.
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
Guest Post: Learn how to navigate through the relevant RFCs associated with publishing IPv6 NTP servers with DHCPv6.
Guest Post: BGD e-GOV CIRT takes us through the steps of a recent Exchange cyber drill run for local financial institutions in Bangladesh.
Guest Post: Learn how to use open-source tools, Suzieq and Batfish, to validate and evaluate network automation processes.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2021’s best.
Guest Post: Learn how to test and validate configurations before deploying new changes to the production environment.
Guest Post: Team Cymru takes us through the steps of a threat hunt.
Guest Post: Follow this network operator’s test environment to learn how to set up RPKI.