Inspired by Insecure

indicators of compromise

05/09/16 |Blog # , , ,

Talent Lab and Indicators of Compromise

The data obtained by Honeypot sensors requires manual analysis and interpretation, and in most cases cannot be used in automated tools to identify the threat in other segments of the network. It is necessary to create and demonstrate a set of data that can be used as indicators of compromise (IoC) and which is received in an automated mode. The use of this data by other automated tools should not lead to false positives.
Continue reading

0 likes no responses
Stay up to date

Smoking kills. And vaporizing kills too: how your e-cigarette can hack your computer.
Honeypots and the Internet of Things: analysis of data harvested #IoT honeytraps
Announcing Google Capture the Flag 2017 #CTF
@cucrisis "determination" = "motivation", "isolation" = "predefined_subnetwork"?
"Proposed US Bill would legalize aggressive #hackback attacks." Where I missed a strong "Attack Attribution" patent?
Recent Comments
- Sergey to Погружение в даркнет: Снифаем выходную ноду Tor и анализируем получившийся контент
лучше заходиииииииить через тор онлайн,...
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...