Process Reimaging really piqued my interest as it seemed to be focused on flying under the radar to avoid detection. Each technique an attacker leverages will have data that follows the behavior of the attack. This can be leveraged, but only once we understand our data and data sources. Moving away from signature based hunts to more of the data driven hunt methodology will help with the robustness of detections. 首先,你对这段原文的翻译有质疑,但我要说明的是,关于radar那块,明显radare那里需要意译翻译,但我又找不出合适的意译了,所以我直译的,尽管十分不通顺。作者想表达的意思应该是灯下黑。其余的地方我不认为哪里有机翻的嫌疑。其次,单方面的结论似乎没有意义。