Published On Mar 20, 2024
Threat hunting on Linux is most effective looking for tactics and techniques vs. traditional malware signatures. In this video, Sandfly founder Craig Rowland discusses the differences in relation to log tampering for anti-forensics on Linux.
Be sure to subscribe and follow us:
https://www.sandflysecurity.com
/ sandflysecurity
/ sandfly
/ sandflysec
show more