Threat Hunt Deep Dives: Get to Know Your Logs — Pt. 2

By Lee Archinal at Cyborg Security

Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second installment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”

SIGN UP FOR THE HUNTER PLATFORM HERE 👉https://hunter.cyborgsecurity.io

Use promocode “KNOWYOURLOGS” for a community edition account on the threat hunting content platform, HUNTER.

Don’t miss upcoming content and videos from Lee Archinal! Follow him here 👇

Twitter: @ArchinalLee

LinkedIn: https://www.linkedin.com/in/lee-archinal/

--

--

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.