Hunting for Malware Network Traffic using Jupyter Notebooks
Mar 17th @ 7:00 pm

When malware hides itself on a system or injects itself into a legitimate process, it can be difficult to detect. A powerful threat hunting technique to help with this situation is analyzing the patterns of network communications to find suspicious recurring connections that could be malware beaconing to its Command and Control (C2) server. In this webinar, we’ll look at ways to detect this type of beacon pattern even in massive amounts of network events using a Jupyter Noteboo…More details at the Event Website below.


7:00 pm