How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops
Description
Last week we explored the basics of Yara and how to write string rules. This week’s #techtalktuesday explores how to write binary pattern rules in Yara to enhance your threat hunting, digital forensics, incident response, and cybersecurity program. We walk through a few examples of binary rules and explore how to leverage Yara to discover malware and hacking activity.