3 links
tagged with all of: detection + telemetry
Click any tag below to further narrow down your results
Links
Detection engineering requires an understanding of how attackers exploit subtle flaws in detection rules. The article highlights five common pitfalls that can lead to missed threats, including parameter variations, command chaining, double spaces, obfuscation techniques, and unaudited commands. By addressing these issues, detection engineers can improve their rule-writing to better catch malicious activity.
Call stacks enhance malware detection by providing detailed insights into who is executing specific activities on Windows systems. By utilizing execution tracing features and enriching call stack data, Elastic's approach improves the ability to identify and respond to malicious behavior more effectively. The article emphasizes the importance of accurately analyzing call stacks to expose the lies malware authors use to conceal their actions.
Detection engineering relies on assumptions made during the creation of detection rules, which are often based on limited data and can lead to false positives. Continuous reassessment of these assumptions is vital, especially as environments and behaviors evolve. The article discusses the challenges of tuning detection rules while balancing the need for accuracy and the limitations of available telemetry.