Inspired by Insecure

indicators of compromise

05/09/16 |Blog # , , ,

Talent Lab and Indicators of Compromise

The data obtained by Honeypot sensors requires manual analysis and interpretation, and in most cases cannot be used in automated tools to identify the threat in other segments of the network. It is necessary to create and demonstrate a set of data that can be used as indicators of compromise (IoC) and which is received in an automated mode. The use of this data by other automated tools should not lead to false positives.
Continue reading

0 likes no responses
Stay up to date

Twitter
RT @e_kaspersky: The other (vulnerable) side of "Connected Medicine" ⚕ 5 tips from @difezza to make it a safer place for everyone ⟹ https:/…
Connected Medicine and Its Diagnosis: the fatal flaws in medical IT-infrastructure and how to fix it. #SmartMedicine https://t.co/v7S3kwmufD
Cybersecurity in 2020: boosting protection with traps and tripwires to distract the attacker from the genuine asset. https://t.co/LKMtXxOAZo
Channel-to-channel crosstalk: data can be captured if "evil" device is plugged into adjacent ports on same USB hub https://t.co/V85zb3BseK
"Man in the Middle", now I know how you look like. #defcon25 https://t.co/eXJzbToo79
Recent Comments
- Sergey to Погружение в даркнет: Снифаем выходную ноду Tor и анализируем получившийся контент
лучше заходиииииииить через тор онлайн http://torproject.online/,...
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...