Threat Hunt Deep Dives: Get to Know Your Logs — Pt. 2
By Lee Archinal at Cyborg Security
Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second installment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”
SIGN UP FOR THE HUNTER PLATFORM HERE 👉https://hunter.cyborgsecurity.io
Use promocode “KNOWYOURLOGS” for a community edition account on the threat hunting content platform, HUNTER.
Don’t miss upcoming content and videos from Lee Archinal! Follow him here 👇