Threat Hunting with the PE Checksum
What is the PE Checksum? When the portable executable format was developed, network connections were much less reliable than they are today. It was not uncommon for the integrity of a connection to be compromised and the data being transferred to become corrupted. Additionally, it was difficult for a client to detect whether or not […]
Threat Hunting with the PE Checksum Read More »