Part 1 Scenario: You’re a SOC analyst working for a large organization. Someone
Part 1 Scenario: You’re a SOC analyst working for a large organization. Someone in your organization alerted you to a suspect executable on their computer that they did not recognize and they have sent it to you for further analysis. Using your malware analysis workstation you created a brand new “victim” Windows VM and after … Read more