Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, June 12, 2018
Automated Threat Hunting Playbook
Automated Threat Hunting Playbook: Once the automation platform retrieves and attaches the suspicious files and packet captures (step #6), the incident is ready to be verified by an incident analyst.