Aug. 2, 2023, 5:25 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

In our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing relationship between our tools and data and covered some of the domain-specific challenges that come with offensive data collection. We ended with the question “If all of our offensive tools produced and worked with structured data, what would be possible?” This post shifts gears a bit and demonstrates some of our current challenges in post-exploitation workflows, some …

challenges collection community data data collection domain exploitation offensive post-exploitation problem question relationship structured data tools workflows

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Application Security Engineer

@ CyberCube | Tallinn

Security Incident Response Analyst

@ Oracle | KITCHENER, ON, Canada

Senior Security Engineer

@ Minitab | Americas Remote