This paper outlines attack patterns security analysts are seeing and examines a fresh forensic approach some of them have begun using, one that is producing some notable success stories. It is an approach that is helping threat hunters in large enterprise SOCs, as well as security specialists in SMBs, to quickly and thoroughly bring a network intruder's footprints into high relief.
This new approach essentially brings both human and machine intelligence to bear on the common denominator to virtually every type of cyber attack found pervasively in the internet wild today.
How to leverage the Domain Name System (DNS) in your investigations
Applicable examples of success using a DNS-centric strategy
Data from DomainTools Cybersecurity Report Card Survey Report
Learn more about how to leverage DNS in your investigations today!