JA4+ network fingerprinting
Guest Post: Powerful human and machine-readable network fingerprints for multiple protocols that improve threat-hunting and analysis.
Guest Post: Powerful human and machine-readable network fingerprints for multiple protocols that improve threat-hunting and analysis.
Guest Post: Understanding the attack surface of ASEAN economies to better support them.
Guest Post: Effective threat hunting, incident response in the cloud, how to stop phishing, and the emotional experience of ransomware.
Guest Post: Learn how to combine Yara with other tools to have full control over the condition validation process.
Guest Post: Learn how to use Yara’s native hexadecimal pattern definition features to create fast rules with fewer false positives and no alarming nested loops.
Guest Post: Learn how to use Yara’s math module and min/max functions to measure distance between patterns.
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2021’s best.
Guest Post: With 100+ analysers, Intel Owl helps with incident response, threat analysis, security research and threat hunting.
Guest Post: Team Cymru takes us through the steps of a threat hunt.