In this case study, you’ll learn how the FireEye team uses Censys to:
- Analyze data attributes that they can use to tie together sets of adversary infrastructure used for malware and phishing campaigns
- Track adversaries based on their behavior and malware trends
- Discover new suspicious and fraudulent assets that were likely created by attackers
- Get a handle on attacker attribution, particularly when fighting nation-state attackers