 
      
    | You are here | objective-see.com | ||
| | | | | loonytek.com | |
| | | | | I had a chance to do several Advisory File-Locking experiments on NFS and local file system. In this article,I would like to give some insight into the concept of advisory locking and share some useful results from my tests. Some Background File Locking is generally useful in an environment where multiple applications or processes may... | |
| | | | | blog.nviso.eu | |
| | | | | In this post, we will illustrate how ee-outliers can be used to detect suspicious child processes. This can be a very helpful way of spotting malicious endpoint activity during our Threat Hunting activities. A few examples where detecting suspicious child processes could help us: Detection of a malicious Microsoft Word file spawning cmd.exe Detection of... | |
| | | | | blog.koehntopp.info | |
| | | | | Kris Köhntopp's blog (Fedi: @isotoppinfosec.exchange) | |
| | | | | 3.70.187.24 | |
| | | |||