Viruses
epub |eng | 2024-01-11 | Author:Seidl, David; [Seidl, David]
( Category:
Viruses
April 9,2024 )
pdf | | 2024-03-04 | Author:Jennifer L. Bayuk
( Category:
Viruses
March 24,2024 )
epub |eng | 2022-03-15 | Author:David Routin & Simon Thoores & Samuel Rossier
As usual, the detection strategy could rely on Sigma and be completed with a frequency/aggregation approach to match the maximum number of potential threats. You may also consider reading the ...
( Category:
Viruses
March 9,2024 )
epub |eng | 2022-02-15 | Author:Chad Maurice & Jeremy Thompson & William Copeland
Finally, the team turned to the success factors, MOPs, and MOEs. MOPs were defined by each section and supplied to the team lead for review. The team lead sent some ...
( Category:
Viruses
February 28,2024 )
epub |eng | 2022-01-15 | Author:Yuri Diogenes & Dr. Erdal Ozkaya
Use of clever tricks The use of clever tricks can help you defend your network against Nmap scanning. The Nmap scan tool, just like many other probe tools, relies on ...
( Category:
Viruses
January 20,2024 )
pdf | | 2023-10-27 | Author:Crawley, Kim;
( Category:
Viruses
January 20,2024 )
epub |eng | 2023-01-15 | Author:Kunal Sehgal & Nikolaos Thymianis
Detective controls These controls provide visibility into security breaches or any malicious or suspicious activity. Detective security controls function during the progression as well as after the occurrence of the ...
( Category:
Viruses
January 16,2024 )
epub |eng | 2023-09-11 | Author:Borg, Omar
Chapter 7.1: Incident Response and Remediation with Yara Rules In this expanded chapter, we will delve into the integration of Yara rules into your incident response and remediation processes using ...
( Category:
Viruses
January 8,2024 )
epub |eng | 2022-01-15 | Author:Kyle Wilhoit & Joseph Opacki
Hybrid collection Hybrid collection utilizes a combination of the passive data collection capabilities of an organization and active collection disciplines in the sense that it requires human interaction from the ...
( Category:
Viruses
January 6,2024 )
pdf | | 2024-10-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
( Category:
Viruses
December 4,2023 )
epub |eng | 2022-11-15 | Author:John Paul Mueller
Exploit: An exploit is a special piece of code or carefully crafted data that takes advantage of a bug, error, or behavior (intended or not) of an application, operating system, ...
( Category:
Viruses
November 30,2023 )
epub |eng | 2023-11-15 | Author:Paul Huijbregts & Joe Anich & Justen Graves
Email notifications Here, you can create email notifications for alerts or vulnerabilities. This is best used selectively; use cases can be for VIP machines or other high-value assets that you ...
( Category:
Viruses
November 27,2023 )
epub |eng | 2022-11-15 | Author:Mark Birch
Objdump This is a similar tool to Readelf in that it can display the contents of operating system files on Unix-like operating systems. Strace Strace is a tool for tracing ...
( Category:
Viruses
November 25,2023 )
epub, pdf |eng | 2024-11-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
Decrypting the Command-and-Control Communications As in the previous chapter, one of the most important properties of the malware weâll want to reverse engineer is its encrypted communication with the command-and-control ...
( Category:
Viruses
November 13,2023 )
epub |eng | 2023-11-15 | Author:Megan Roddie & Jason Deyalsingh & Gary J. Katz
Message Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: 2023-01-14 03:29:21.683 ProcessGuid: {71ccf5f5-2191-63c2-7303-000000001e00} ProcessId: 12852 PipeName: \RemCom_stdinCQHe2366530 Image: C:\Windows\HRrcwYpJ.exe User: NT AUTHORITY\SYSTEM Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: ...
( Category:
Viruses
November 3,2023 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3050)Future Crimes by Marc Goodman(3025)
Mastering Python for Networking and Security by José Manuel Ortega(3003)
Blockchain Basics by Daniel Drescher(2928)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2849)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2681)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2539)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2510)
Machine Learning Security Principles by John Paul Mueller(2415)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2404)
The Art Of Deception by Kevin Mitnick(2325)
The Code Book by Simon Singh(2250)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(2087)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(2078)
Solidity Programming Essentials by Ritesh Modi(2013)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1919)
Wireless Hacking 101 by Karina Astudillo(1872)
DarkMarket by Misha Glenny(1865)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1855)
Mobile Forensics Cookbook by Igor Mikhaylov(1828)