Blog

Join Daniel Smallwood, Sr. Security Engineer at Jask.IO for an interactive session on the key threat detection techniques on Hadoop. Viewers will learn: • Why Hadoop for Threat Hunting? • Overview of Sensors and Data Types • Example Modern Hadoop Architecture • Intro to Zeppelin Notebooks • Threat Hunting Notebooks using PySpark and SparkSQL Source: JASK/BrightTalk

0

A few weeks ago, I published a Base64 decoding article. The findings from this ranged from process ID numbers, application and version detection, to the blatant collection of email addresses. With that in mind, today I’m going to focus on Ads. Not adware, not malvertising, but just ads. Ads are the massive security hole in