Malware/Spear Phishing Detection: Meet TLSH — A Locality Sensitive Hash
Published in
4 min readDec 18, 2022
In digital forensics and cybersecurity, we often use hashing methods to pinpoint a unique hash value for a given set of data. This is known as a cryptographic hash. We can then use the cryptographic hash to determine if something has been changed or not. But, sometimes, we need to create a hash to show that a file is similar to another file. This is the case of…