Episode 27: Host-Based Indicators of Malicious Activity

While the network tells you what’s coming and going, the host shows you what’s actually happening. In this episode, we explore host-level indicators of compromise—from CPU spikes and unauthorized software to abnormal OS behavior and registry anomalies. You’ll learn how to recognize signs of privilege escalation, unauthorized changes, scheduled task manipulation, and malicious processes.
We also break down how analysts correlate these indicators with alerts, event logs, and EDR telemetry to identify infection vectors and map attacker behavior. This is one of the most exam-relevant skill areas in the CySA+ and a critical capability for anyone working in a SOC or digital forensics environment. Brought to you by BareMetalCyber.com
Episode 27: Host-Based Indicators of Malicious Activity
Broadcast by