<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/72a4b0cfa49b4f5ba689b63c29393a1e&quot; frameborder=&quot;0&quot; width=&quot;1162&quot; height=&quot;871&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>871</height><width>1162</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>871</thumbnail_height><thumbnail_width>1162</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/72a4b0cfa49b4f5ba689b63c29393a1e-1c132dcc2b22a093.gif</thumbnail_url><duration>191.978</duration><title>Identifying and Investigating Malware Incidents with ThreatView 🛡️</title><description>In this video, I discuss how incidents like malware introduction on a website often involve multiple related events. I demonstrate how to use ThreatView&apos;s advanced file integrity monitoring tools to track down the source of such issues. By reviewing event details and utilizing the tree view feature, we can identify changes in the web root that coincide with the malware detection. I encourage you to explore these tools to gain a comprehensive understanding of any incidents on your system. Please take action by investigating any flagged events using the methods outlined.</description></oembed>