
Written by Ardavan Alamir, Lead Security Data Scientist and George Thomas, CSIRT Analyst When you spot an Indicator of Compromise (IOC), searching, sorting and sifting through command line terms is typically so inefficient that it’s only done in post-mortem, rather than in real-time. And when you’re hunting threats, quicker is better. We turned the challenge […]
Read article