Threat Hunting – Malware/Angler EK Analysis with Security Onion – GOOFUS AND GALLANT

This is a lab analysis based on the resources available on malware.trafficanalysis.net and publicly available information on threat hunting/malware analysis. Scenario: Tom and Jake are recent hires…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by InfoSec Resources. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/ZVYrfWfGA4o/