Threat Hunt Deep Dives: Get to Know Your Logs — Pt. 2

Cyborg Security
Feb 10, 2022

--

By Lee Archinal at Cyborg Security

Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second installment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”

SIGN UP FOR THE HUNTER PLATFORM HERE 👉https://hunter.cyborgsecurity.io

Use promocode “KNOWYOURLOGS” for a community edition account on the threat hunting content platform, HUNTER.

Don’t miss upcoming content and videos from Lee Archinal! Follow him here 👇

Twitter: @ArchinalLee

LinkedIn: https://www.linkedin.com/in/lee-archinal/

--

--

Cyborg Security
Cyborg Security

Written by Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

No responses yet