In our first malware hunting blog we looked at an incident where a user had downloaded a malicious application from a website. Here we are going to investigate a malicious document which was received via email. This is our second basic investigation , but we will continue to ramp things up over the coming months. …
Continue reading "Detecting a Cyber Attack Part 4 (Sysmon – Basic malware hunting 2)"