15.04.2020

Free workshop Threat Hunting with Yara from Kaspersky

March 31, Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), shared his best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization. In the spirit of supporting the community during COVID-19 and lockdown, the webinar has been published online.

YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic

This webinar is based on Kaspersky’s training on YARA rules. It evaluates (hands on) how to write test and improve effective YARA rules and how to maximize your knowledge for building effective APT detection strategies with YARA.