Module 5: Hunting on Endpoints
Endpoints for Threat Hunters
Types of Endpoint IoCs
Sources of Endpoint Data
Endpoint IoC Considerations
Practical Endpoint Threat Hunting
The Akira Ransomware Incident
Ransomware Artifacts
File Artifacts
Adapting our Methodology
Last updated