Malware Classification with ‘Graph Hash,’ Applied to the Orca Cyberespionage Campaign

In malware research, threat hunting and sharing of threat intelligence, such as exchanging indicators of compromise (IoCs) in the form of hashes (e.g., MD5s, SHA256s), are common industry practices and helpful for information security professionals. Researchers, for instance, would typically Read More …