Enterprise Detection & Response

Tuesday, April 5, 2022

Stop Using Hashes for Detection (and When You Should Use Them)

›
 Fun fact! When I published the Pyramid of Pain in 2013 it didn’t exactly match up with today’s version.  Here’s what it originally looked ...
2 comments:
Tuesday, May 1, 2018

Enhancing Enhanced Privacy: Checking Pwned Passwords Quickly and Anonymously with Bloom Filters

›
[ Update 2018-06-15: A colleague pointed out a link to similar work , but written in Go.] It all started innocently enough, but like most...
2 comments:
Tuesday, November 29, 2016

Hunting for Malware Critical Process Impersonation

›
A popular technique for hiding malware running on Windows systems is to give it a name that's confusingly similar to a legitimate Windo...
2 comments:
Monday, September 26, 2016

Detecting Data Staging & Exfil Using the Producer-Consumer Ratio

›
In their FloCon 2014 presentation  PCR - A New Flow Metric , Carter Bullard and John Gerth introduced the idea of the Producer-Consumer Rati...
›
Home
View web version

About Me

DavidJBianco
View my complete profile
Powered by Blogger.