3 links
tagged with all of: security + telemetry
Click any tag below to further narrow down your results
Links
Detection engineering requires an understanding of how attackers exploit subtle flaws in detection rules. The article highlights five common pitfalls that can lead to missed threats, including parameter variations, command chaining, double spaces, obfuscation techniques, and unaudited commands. By addressing these issues, detection engineers can improve their rule-writing to better catch malicious activity.
Call stacks enhance malware detection by providing detailed insights into who is executing specific activities on Windows systems. By utilizing execution tracing features and enriching call stack data, Elastic's approach improves the ability to identify and respond to malicious behavior more effectively. The article emphasizes the importance of accurately analyzing call stacks to expose the lies malware authors use to conceal their actions.
COMmander is a lightweight C# tool designed to enhance defensive telemetry for RPC and COM by utilizing the Microsoft-Windows-RPC ETW provider to monitor system events based on user-defined detection rules. It operates by reading a configuration file to filter and detect specific RPC events, while logging relevant information in the Windows Event Viewer. Installation and uninstallation processes are straightforward, requiring administrator privileges for executing PowerShell scripts.