Article: Using Real-Time Events in Investigations - published over 4 years ago. Content: To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the Master File Table (MFT), registry hives, and Application Compatibility Cache (AppCompat). However, these evidence sources were not designed with detection or incident response in mind; crucial det... http://www.fireeye.com/blog/threat-research/2020/05/using-real-time-events-in-investigations.html Published: 2020 05 14 15:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Click to Open Code Editor