
Dropper
Dropper Overview A dropper (sometimes referred to as Stage 1 or erroneously as a “loader”) is a type of malware that is purposefully engineered to
Dropper Overview A dropper (sometimes referred to as Stage 1 or erroneously as a “loader”) is a type of malware that is purposefully engineered to
A downloader (often referred to as a loader or Stage 1) is a form of malware that is designed to download content from a remote
What is Ransomware? Ransomware is a piece of malicious code that is designed primarily for the purposes of encrypting files on a compromised system. This
Overview of Backdoors A backdoor is a piece of malicious code that is designed to allow surreptitious access to a compromised system or systems. Backdoors
What is a Security Operations Center (SOC)? Analysts in a dark room that is only illuminated by the glow of monitors–that’s often the image that
WHAT IS THREAT DETECTION? Threat detection is the repeatable process conducted in near real time, or retroactively, in order to detect and respond to adversary actions
TABLE OF CONTENTS What is Threat Hunting?A Part of the Security ProgramHow to Hunt: Threat Hunting CycleDeveloping a Hunt PlanThreat Hunting TechniquesThreat Hunting ToolsA Mandatory
TABLE OF CONTENTS What is SIEM?How Do SIEM Security Solutions Work?Security Operations Center SIEM GoalsSIEM Software vs. Managed SIEMSecuring Better, TogetherRelated Resources WHAT IS SIEM?