Anatomy of an Attack: CARBANAK
Jack Wesley Riley has published a white paper with an overview of tools and techniques used by CARBANAK. According to the pa…
Jack Wesley Riley has published a white paper with an overview of tools and techniques used by CARBANAK. According to the pa…
Mimikatz is a common tool used by APT in modern cyber attacks to harvest admin’s and user’s login credentials. I…
Incident response and digital forensics require a balancing act to get right, but both are essential when an information sec…
Moving from on-premises deployments to the cloud can offer incredible benefits to many organizations, including a plethora o…
This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt…
A common challenge in the digital forensics and incident response (DFIR) community has been creating a DFIR toolkit that is …
Jason Hale has published a post about the impact of VBS on memory acqusition. With Windows 10 and Server 2016, Microsoft add…
Here is a talk by Martin Schmiedecker from SHA2017 on incident response: SHA2017 is a non profit outdoor Hacker camp/confere…
Basil Alawi S.Taher has posted a nice overview of how to start using VolUtility – a web frontend for Volatility f…
Windows systems are still king of the desktop and server operating systems, thus the #1 target of hackers, malware, ransomwa…
Login