Detecting Malicious SMB Activity Using Bro

Attackers utilize the Server Message Block (SMB) protocol to blend in with network activity, often carrying out their objectives undetected. Post-compromise, attackers use file shares to move laterally, looking for sensitive or confidential data to exfiltrate out a network. Traditional… Read more →

Article Link: http://www.itsecuritynews.info/detecting-malicious-smb-activity-using-bro/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:%20ItSecurityNewsAggregated%20(IT%20Security%20News)