Hashed and rehashed, a tale of Goodware hashes

Threat Hunting
Creating SOAR Automation

Find out how to utilize goodware hashes in your security workflows, and how they can be beneficial!

https://medium.com/p/61da19c65528