Chapter

Hias: Identifying Infrastructure for Cyberattacks
Hias focuses on cyber threat intelligence to identify infrastructure utilized by adversaries for attacks. By analyzing domains and identifying the relationships between attackers and infrastructure providers, they aim to prevent cyberattacks before they occur.
Clips
The intention of malware is to be stealthy and hide and it is a mistake for cybercriminals to create something without considering the end results.
32:40 - 34:51 (02:11)
Summary
The intention of malware is to be stealthy and hide and it is a mistake for cybercriminals to create something without considering the end results.
ChapterHias: Identifying Infrastructure for Cyberattacks
Episode94: Mariposa
PodcastDarknet Diaries
Hias focuses on identifying the infrastructure used by adversaries to set up botnets and various attacks before they occur by monitoring domain lookups and cash refreshes to identify compromised computers within a network.
34:51 - 39:21 (04:30)
Summary
Hias focuses on identifying the infrastructure used by adversaries to set up botnets and various attacks before they occur by monitoring domain lookups and cash refreshes to identify compromised computers within a network.