Effective Threat-Hunting Queries in a Redacted World

This article has been indexed from Threatpost

Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers’ infrastructure.

Read the original article: Effective Threat-Hunting Queries in a Redacted World