After analyzing the first targeted attack, the team set up Yara rules to identify any usage of de-obfuscated attack files, explains Michael Gorelik, Morphisec CTO and vice president of R&D.
Read more on Dark Reading here.
After analyzing the first targeted attack, the team set up Yara rules to identify any usage of de-obfuscated attack files, explains Michael Gorelik, Morphisec CTO and vice president of R&D.
Read more on Dark Reading here.