Remove blogs tag malware hunting
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Steg malware is uncommon relative to other malware.

Malware 96
article thumbnail

How to Start Threat Hunting

Palo Alto Networks

We’ve just wrapped up our first ever Inside the Hunt Virtual Threat Hunting Summit and were blown away by the fantastic engagement from everyone who attended ( here’s the replay if you missed it). Of the many great questions submitted by the audience, one stood out most prominently: “How do I start threat hunting?”.

How To 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

The following is a true story from a pilot Cortex XDR Managed Threat Hunting customer, and it showcases the security outcomes that can be achieved today when you pair powerful AI with elite threat hunting expertise. On a sunny Saturday morning, an anomalous signal came to the Cortex Managed Threat Hunting team’s attention.

article thumbnail

9 Free Tools to Automate Your Incident Response Process

Altexsoft

It enables threat hunting and easy export of data in a variety of formats. MISP , formerly known as Malware Information Sharing Platform, is a threat intelligence platform. Using TheHive, you can tag, sort, and filter evidence for investigation, and export it for threat intelligence sharing. Can be complicated to deploy.

Tools 109
article thumbnail

Protect Your iOS Devices with Cortex XDR Mobile

Palo Alto Networks

Hunting Down Jailbroken Devices. Jailbreaking increases the risk of downloading malware. They may use a stager to deliver the payload directly into memory rather than installing malware on the host machine. Financial Malware and Cryptomining Protection. It can also create stability issues. With Cortex XDR 3.5,

Mobile 98
article thumbnail

10 Cloud Security Risks Organizations Should Address

Prisma Clud

You can view indicators of compromise (IOC) for each CTAG under respective tags that include Automated Libra, Adept Libra, Thief Libra, Money Libra, Aged Libra and Returned Libra. The post 10 Cloud Security Risks Organizations Should Address appeared first on Palo Alto Networks Blog. But logging is only a foundational component.