These guidelines were created for threat hunters and security analysts with highly technical skills that can be used to identify threats by developing hypotheses, locating infection evidence across environments, and providing indicators for attack detection.
The guidelines outlined in this report provide the logic for hunting malware samples or malicious techniques and can be converted into detection rules or mitigation strategies.
In this report, you’ll learn about: