How To Use Process Hacker to Explore Malicious Service and Network Activity During DFIR/Threat Hunts
Description
In this week’s #techtalktuesday we continue last week’s series on the free, dynamic analysis tool Process Hacker and explore how to use Process Hacker to explore services and network connection information to enhance your threat hunting, incident response, and cyber security efforts.