Star 0

Abstract

We describe efficient threat hunting strategies at scale to help augment manual threat hunting techniques commonly used in the industry. The indicators we discuss are long term patterns that can be used to identify a host of malware campaigns. The audience will also learn about the backend infrastructure used to enable large scale quick detection of threats.