WingNews logo WingNews
top | new | best | ask | show | jobs
top | item 19936781

(no title)

clebio | 6 years ago

It depends on attack surface and what tooling you already have in place. But for example:

> Finding suspicious outbound network activity

https://blog.rapid7.com/2016/05/09/introduction-to-osquery-f...

discuss

order

No comments yet.

powered by hn/api // news.ycombinator.com