Threat hunting with Yara: The red pill approach
Guest Post: Learn how to combine Yara with other tools to have full control over the condition validation process.
Guest Post: Learn how to combine Yara with other tools to have full control over the condition validation process.
Guest Post: Learn how to use Yara’s native hexadecimal pattern definition features to create fast rules with fewer false positives and no alarming nested loops.
Guest Post: Learn how to use Yara’s math module and min/max functions to measure distance between patterns.
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2021’s best.
Guest Post: With 100+ analysers, Intel Owl helps with incident response, threat analysis, security research and threat hunting.
Guest Post: Team Cymru takes us through the steps of a threat hunt.
Guest Post: Sigma is an open-source project that tries to solve challenges with store logs in different repositories.
Guest Post: Yara rules are an easy yet important threat hunting tool for searching for malicious files in your directories.
Asia Pacific organizations are getting better and more proactive at detecting compromises in their own network.