Now we are finished with our "Creating a Cyber Attack" series where we showed how a cyber attack is put together, we are now going to move onto detection. Sysmon has been around for a while now, but recently is really gaining traction as a must have for organisations. Sysmon basically allows enhanced logging of …
Continue reading "Detecting a Cyber Attack Part 1 (Sysmon – endpoint install)"
