-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response for Windows
By :

This stage is also called pre-hunting, where the team responsible should achieve the following milestones:
The first step towards establishing a threat-hunting process is building the organization’s cyber threat landscape. The process was explained in detail in Chapter 1. Utilizing the databases of several threat intel providers (be they open source or paid) will give a more detailed picture. Also, keep in mind that most top-notch cybersecurity vendors publish blog posts about emerging threats, so this intel can be also pulled from their websites. Note also that insights from red teams are often shared in conference talks, by cybersecurity services providers, on GitHub, and in the blog posts of enthusiasts. To maintain better visibility, there are tools that can be used to aggregate...
Change the font size
Change margin width
Change background colour