PinnedAli SeferWindows Forensics Fundamentals | Part FourPlease be sure to check out the previous blogs in the series before reading this post. The topics to be covered here will be assumed to be…Oct 11Oct 11
PinnedAli SeferWindows Forensics Fundamentals | Part ThreePlease don’t forget to read part one and part two before starting this blog post!Oct 7Oct 7
PinnedAli SeferWindows Forensics Fundamentals | Part TwoThis blog post will be a continuation of my previous post and will deal more with technical issues. Please check out my other blog post…Oct 2Oct 2
PinnedAli SeferWindows Forensics Fundamentals | Part OneIn digital forensics and incident response (DFIR), Windows operating systems are among the most commonly analyzed environments. After a…Sep 301Sep 301
PinnedAli SeferWindows | Active Directory Security 101As Windows operating system users, we understand the importance of keeping our computers safe and secure. In this blog post, we will…Apr 5Apr 5
Ali SeferWazuh | Detect LOLBAS AttacksIn today’s cybersecurity landscape, threats are becoming increasingly sophisticated, requiring security professionals to stay vigilant…Sep 22Sep 22
Ali SeferPractical Malicious Office Document AnalysisIn the digital age, Office documents such as Word, Excel, and PowerPoint files are ubiquitous in both personal and professional…Jul 26Jul 26
Ali SeferThreat Hunting with VelociraptorCybersecurity threats are constantly evolving and becoming more complex. Effective detection and analysis of these threats play a critical…Jul 221Jul 221
Ali SeferNetworkMinerNetwork Forensic is a discipline that involves the detailed examination and analysis of events occurring in computer networks. This…Apr 26Apr 26
Ali SeferSimple Network Analysis with WiresharkIn the era of modern information technologies, cybersecurity has become an indispensable part of networks. This article will focus on the…Apr 2Apr 2