Effective Threat-Hunting Queries in a Redacted World
Effective Threat-Hunting Queries in a Redacted World
Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers' infrastructure.