PinnedWindows Forensics Fundamentals | Part FourPlease be sure to check out the previous blogs in the series before reading this post. The topics to be covered here will be assumed to be…Oct 11Oct 11
PinnedWindows Forensics Fundamentals | Part ThreePlease don’t forget to read part one and part two before starting this blog post!Oct 7Oct 7
PinnedWindows Forensics Fundamentals | Part TwoThis blog post will be a continuation of my previous post and will deal more with technical issues. Please check out my other blog post…Oct 2Oct 2
PinnedWindows Forensics Fundamentals | Part OneIn digital forensics and incident response (DFIR), Windows operating systems are among the most commonly analyzed environments. After a…Sep 302Sep 302
PinnedWindows | Active Directory Security 101As Windows operating system users, we understand the importance of keeping our computers safe and secure. In this blog post, we will…Apr 5Apr 5
Wazuh | Detect LOLBAS AttacksIn today’s cybersecurity landscape, threats are becoming increasingly sophisticated, requiring security professionals to stay vigilant…Sep 22Sep 22
Practical Malicious Office Document AnalysisIn the digital age, Office documents such as Word, Excel, and PowerPoint files are ubiquitous in both personal and professional…Jul 26Jul 26
Threat Hunting with VelociraptorCybersecurity threats are constantly evolving and becoming more complex. Effective detection and analysis of these threats play a critical…Jul 221Jul 221
NetworkMinerNetwork Forensic is a discipline that involves the detailed examination and analysis of events occurring in computer networks. This…Apr 26Apr 26
Simple Network Analysis with WiresharkIn the era of modern information technologies, cybersecurity has become an indispensable part of networks. This article will focus on the…Apr 2Apr 2