How to build profiles based on suspicious processes behavior to be used in sandbox? [on hold]

As part of a project, I need to build/configure profiles based on suspicious processes behavior to which matching can be done within a sandbox, when files are being executed. The directive is to work with the IoC – Indicators… Continue reading How to build profiles based on suspicious processes behavior to be used in sandbox? [on hold]

Simplifying Malware Analysis for the C-Suite and Security Operations

IBM X-Force Malware Analysis on Cloud is a SaaS solution that helps analysts identify malware and shorten the time to remediate a potential infection.

The post Simplifying Malware Analysis for the C-Suite and Security Operations appeared first on Security Intelligence.

Continue reading Simplifying Malware Analysis for the C-Suite and Security Operations

Black Hat Asia NOC: Malware visibility

By Chris Thomas and Mike Sconzo In the Black Hat Asia NOC we worked to ensure the wireless network was available for presenters and attendees. As part of our monitoring, we kept an eye open for any malware present on the network. RSA NetWitness® Suite’s Malware Detection capabilities look for network sessions containing file-types typically…

The post Black Hat Asia NOC: Malware visibility appeared first on Speaking of Security – The RSA Blog.

Continue reading Black Hat Asia NOC: Malware visibility