top of page
Search


Threat Hunting Trick - Identify network activity to hunt malicious connections
Back in 2016 I published a paper describing the process to identify and classify network connections inside an Android device as the...
Luis Miguel Acosta Guzmán
Aug 8, 20214 min read
Â
Â
bottom of page


