How Attackers Use Search Engines and What You Can Do About It
Cloud Incident Response: How to Acquire and Analyze a VM Disk Image in Azure
Azure(Virtual Machine Logs) : A Guide for IR
Azure(NSG/Storage Account Logs) : A Guide for IR
Azure(Tenant/Subscription Logs) : A Guide for Incident Response
A New Era of Global Stability
Azure(Tenant Logs) : A Guide for IR
Understanding VM Types and Azure Network for IR
Azure Resource Groups and Role-Based Access Control: A Guide for IR
"Step-by-Step Guide to Uncovering Threats with Volatility: A Beginner’s Memory Forensics Walkthrough"
MemProcFS/MemProcFS Analyzer: Comprehensive Analysis Guide
Memory Forensics Using Strings and Bstrings: A Comprehensive Guide
Fileless Malware || LOLBAS || LOLBAS Hunting Using Prefetch, Event Logs, and Sysmon
Leveraging Automation in AWS for Digital Forensics and Incident Response
Optimizing AWS Cloud Incident Response with Flow Logs, Traffic Mirroring, and Automated Forensics
AWS Security Incident Response Guide: A Dive into CloudWatch, GuardDuty, and Amazon Detective
Power of AWS: EC2, AMIs, and Secure Cloud Storage Solutions
AWS: Understanding Accounts, Roles,Secure Access and AWS Instance Metadata Service (IMDS) and the Capital One Breach
Cloud Services: Understanding Data Exfiltration and Investigation Techniques
Microsoft 365 Security: Understanding Built-in Detection Mechanisms and Investigating Log Events