osquery uses basic SQL commands to leverage a relational data-model to describe a device.
Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process.
Updated on Feb 01 2024
Full list of changes available here
Comments
User Ratings