Category Archives: Short talk

Hunting Attacker Activities – Methods for Discovering and Detecting Lateral Movements

When attackers intrude into a network by APT attack, malware infection spreads to many hosts and servers. In incident investigations, it is important to examine what actually happened during lateral movement through log analysis and forensic investigation of infected hosts. However, in many cases, there may not be sufficient logs

« Older Entries