Showing page 1571 of 1580 of 1750 results.

Blog
Over time people have had an on-again, off-again interest in  Event Tracing for Windows  (ETW). ETW, first introduced in Windows 2000, is a lightweight Kernel level tracing facility that was originally intended for debugging, diagnostics and performance. Gradually, however, defenders realized that ETW provided metrics and data content that was not otherwise available without custom development efforts. Even so, aside from a number of big players in the industry, people have been slow to adopt ETW as a data source for detection and research. The two primary problems with ETW are: the complexities involved in event collection, and the volume of data that is generated. The task of looking through a haystack to find the proverbial needle is not necessarily appealing from an engineering perspective (How do you store the data? How do you process the data? Is the data really valuable? What were we looking for again?).
Blog
FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry.
Blog
This blog post presents a machine learning approach to detecting obfuscated Windows command line invocations on endpoints.