How to become a master cyber-detective

In this article, Digital Guardian's cybersecurity chief, Bandos, explains how to spot intrusions and password dumping programs, locate dropper software, and block secret backdoors in your company's network. In an interview with techrepublic, he also shared the threat hunting process and best practices for rooting out and responding to intrusions.
 
Here are the list of threat hunting process and best practices:
  1. Low and slow connections
  2. Suspicious sites
  3. Failed logon attempts
  4. Explicit credentials
  5. Privilege changes
  6. Low-hanging fruit
  7. Signs of password dumping programs
  8. Common backdoors
  9. Dropper programs

Read more...