Threat Hunting for HTTP User Agents

This post was originally published here by Chris Sanders. An attacker will use the minimal amount of effort required to compromise your network. That means when it’s possible to reuse applications, tools, and protocols…. they’ll do it! This is one reason why attackers often use HTTP to facilitate communication to and from infected hosts. In […]

Share this page