<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">
Webinars

Applying YARA to Uncover Hidden Phishing Threats Months After the Attack

Applying YARA to Uncover Hidden Phishing Threats Months After the Attack

Phishing continues to be a primary attack vector, preying on unsuspecting yet targeted end users who unintentionally infect their systems. Often these attacks introduce new or updated malware which can go undetected for months. And to exacerbate the security challenge, EDR systems don’t often retain histories of the binaries executed on local endpoints. So organizations are faced with the dilemma- how do I uncover phishing payloads across my endpoints months after their IOCs are known?

If you want to go deep on YARA, be sure to register for REVERSING 2020, where Threat Hunters and Researchers come together to network and learn everything YARA.