Tag: Threat Hunting
All the articles with the tag "Threat Hunting".
Hunting Beyond Indicators
Published: at 08:57 PMI wrote a blog for THOR Collective on the value of hunting beyond Indicators of Compromise.
Don't Cry Wolf - Evidence-based Assessments of ICS Threats
Published: at 07:05 PMJimmy Wylie's and my DEF CON'33 talk is now available on YouTube. We discuss the analytical rigor undertaken before claiming a capability is "ICS-specific malware" with some specific examples I found while threat hunting.
PLC Password Cracking Malware
Published: at 06:05 PMRead about my research on PLC password cracking software being sold online. Turns out, it also gives you a Sality malware infection. This research was covered in major tech journals!