
A tale of two botnets. [Research Saturday]
CyberWire Daily
00:00
Mapping Malicious Infrastructure: Indicators of Compromise
This chapter explores the key indicators of compromise in cybersecurity that researchers use to identify and analyze cyber threats. It emphasizes the methodologies for linking suspicious activities through IPs and domains, leveraging tools like VirusTotal and honeypots to deepen insights into the malicious landscape.
Transcript
Play full episode