
Magnet Forensics' Matt Suiche on the Rise of e-Crime and Info Stealers
Forensic Focus
00:00
How Do You Approach a Threat Hunt?
Using lightweight tools is very expensive and very time intensive. You would always have like some information right telling you where to go because if you have a suspicion on yeah so let's say let's say it's like a suspicion and what has been compromised or what you don't want to be compromised. Or in the case of even something with memory, if you can schedule like memory snapshots over time,. Use that as a raw form of log, follow your critical assetsBecause of useless, like, big chunk of it's large, very big.
Play episode from 34:02
Transcript


