filmov
tv
Threat Hunting using an Indicator of Compromise (IOC) File
![preview_player](https://i.ytimg.com/vi/HrdOsW5MMTk/maxresdefault.jpg)
Показать описание
In this video I cover how to use the indicator of compromise file that I had generated in my last video, using Mandiant/FireEye's Redline application.
"A free endpoint security tool that provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile."
If you found this helpful please consider leaving a like or comment!
Links:
If you might be interested in looking at the Security Blue Team's "Introduction to Threat Hunting" course yourself; Link is below!
"A free endpoint security tool that provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile."
If you found this helpful please consider leaving a like or comment!
Links:
If you might be interested in looking at the Security Blue Team's "Introduction to Threat Hunting" course yourself; Link is below!
Threat Hunting using an Indicator of Compromise (IOC) File
Cybersecurity Threat Hunting Explained
Threat Hunting Explained
How to Hunt for Indicators of Compromise in CrowdStrike Falcon
Cloud Threat Hunting
Hunting in the Depths - The Need for a Strategic Threat Detection Model
Threat Hunting with CIRCL MISP
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017
[Webinar] Malware Analysis: Threat Hunters and Threat Indicators
Network Threat Hunting Made Easy (Finding Hackers)
Threat Hunting for IOCs with Elastic Stack
Threat Hunting with a Remote Workforce
Behavioral vs Indicator-Based Threat Hunting (And Why You Should Be Doing Both To Be Successful)
Threat Hunting with ThreatQ
Must Collect IOCs... Now What?! - Threat Hunting Summit 2016
11-13-2021 Driving the Indicator Lifecycle with Threat Hunting | workshop Discord security
Threat Hunting Tutorial: Introduction
Driving the Indicator Lifecycle with Threat Hunting workshop Discord security
Oleksii Baranovskyi - Indicator of compromise lifecycle and evaluation during threat hunting
Driving the Indicator Lifecycle with Threat Hunting workshop Discord security
SOAR Use Case | Automated Threat Hunting with Security Automation
What Is Threat Hunting? | Threat Hunting Techniques | Secrets of Effective Threat Hunting
Tanium Solution Demo: Threat Hunting
Hunt and Gather: Developing Effective Threat Hunting Techniques
Комментарии