Category Archives: Forensics and threat hunting

What is a Malicious App and How to Spot One?

We’re all familiar with terms such as “threat-hunting”, “boots on the ground Intelligence” or “DNS traffic filtering.” Going back to one’s roots is always a good idea and today I’ll do just that. This article is dedicated to malicious applications. Indeed, we are going to talk about the malicious app definition, what makes an app […]

The post What is a Malicious App and How to Spot One? appeared first on Heimdal Security Blog.

The Cyber Kill Chain Model: A Comprehensive Guide

The cyber kill chain model offers a detailed perspective and the appropriate methods to recognize incidents surrounding an attack against an organization. This model allows security teams to impede the assault during a certain stage and consequently design stronger security and enhance their incident response and analysis capabilities. Throughout the past couple of decades, cyber […]

The post The Cyber Kill Chain Model: A Comprehensive Guide appeared first on Heimdal Security Blog.