The COVID pandemic has had an extremely dramatic impact on various aspects of our lives, and when it comes to the cybersecurity industry, one of its most "visible" effects was the cancellation of many industry conferences. Now, however, the time is slowly approaching when they are going back to the offline version. And one of such events is CONFidence, for which [...]
Month: April 2022
Sigma (grindset?) Rules - find suspicious events with Sigma
In the previous post, we looked at the creation and functionality of YARA rules, which are an invaluable aid to analysts in detecting and classifying files. Some might say, however, that today is not enough. After all, living off the land attacks are becoming more and more popular, where attackers do not use additional software, but are satisfied with [...]
YARA rules! - about YARA rules and writing them.
In the post about finding information about malware samples in open sources, I briefly mentioned the use of YARA rules and described the basics of using them in the context of HybridAnalysis. However, this tool is important and universal in the work of a CTI analyst, incident responder or threat hunter, that it is definitely worth devoting a separate [...]