Learn how #threatintelligence from Recorded Future arms risk teams with vital, up-to-date information by using an automated approach to risk data collection:
3 Common GRC Challenges Threat Intelligence Helps Overcome
See how incorporating threat intelligence with GRC technology can help solve three of the mos... more
We applied our new research on malware classification, which we've named #GraphHash, to the Orca #cyberespionage campaign in order to test its viability. Our findings:
Malware Classification with 'Graph Hash,' Applied to the Orca Cyberespionage Campaign - TrendLabs...
"Graph Hash" uses various approaches in calculating hashes of executables using a graph view,... more
No comments:
Post a Comment