DISCARDED: Tales From the Threat Research Trenches cover image

The Art of Threat Detection Engineering

DISCARDED: Tales From the Threat Research Trenches

00:00

I Clod Is at Work in Detection

In the lower end of the pyramid of pan, it's pretty easy to bypers easy detection signatures. We try to create very generic signatures on known malicious techniques in addition to specific signatures like banduk combined with confic extraction. But also, we don't have to forget the lower part of the paramid of pain, because if the detonation in the d d x chain doesn't work and we don't come to see the interesting parts, then we still need signatures for the pdf and the email to detect sings earlier in the pipe line. I clod is at work in detection.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app