
The Art of Threat Detection Engineering
DISCARDED: Tales From the Threat Research Trenches
00:00
I Clod Is at Work in Detection
In the lower end of the pyramid of pan, it's pretty easy to bypers easy detection signatures. We try to create very generic signatures on known malicious techniques in addition to specific signatures like banduk combined with confic extraction. But also, we don't have to forget the lower part of the paramid of pain, because if the detonation in the d d x chain doesn't work and we don't come to see the interesting parts, then we still need signatures for the pdf and the email to detect sings earlier in the pipe line. I clod is at work in detection.
Transcript
Play full episode