1. EachPod
EachPod

Episode 27: Host-Based Indicators of Malicious Activity

Author
Dr. Jason Edwards
Published
Tue 15 Jul 2025
Episode Link
https://share.transistor.fm/s/364b526a

While the network tells you what’s coming and going, the host shows you what’s actually happening. In this episode, we explore host-level indicators of compromise—from CPU spikes and unauthorized software to abnormal OS behavior and registry anomalies. You’ll learn how to recognize signs of privilege escalation, unauthorized changes, scheduled task manipulation, and malicious processes.

We also break down how analysts correlate these indicators with alerts, event logs, and EDR telemetry to identify infection vectors and map attacker behavior. This is one of the most exam-relevant skill areas in the CySA+ and a critical capability for anyone working in a SOC or digital forensics environment. Brought to you by BareMetalCyber.com

Share to: