top of page
-
Nov 14, 20242 min read
How Attackers Use Search Engines and What You Can Do About It
Search engines are incredible tools for finding information online, but they can also be used by attackers for reconnaissance. How...
21 views0 comments
-
Nov 10, 20244 min read
Cloud Incident Response: How to Acquire and Analyze a VM Disk Image in Azure
When conducting incident response in the cloud, there often comes a point when logs alone aren’t enough, and we need direct access to...
71 views0 comments
-
Nov 8, 20243 min read
Azure(Virtual Machine Logs) : A Guide for IR
Lets talk about Fifth category called: Virtual Machine Logs Azure provides a range of logging options for virtual machines (VMs ) to...
24 views0 comments
-
Nov 8, 20246 min read
Azure(NSG/Storage Account Logs) : A Guide for IR
Lets Talk about Third category called: Resource Azure offers a variety of logging resources to support incident response, monitoring, and...
36 views0 comments
-
Nov 7, 20247 min read
Azure(Tenant/Subscription Logs) : A Guide for Incident Response
While the Log Analytics Workspace  is an excellent tool for monitoring and analyzing logs in Azure, storing logs in a Storage Account...
31 views0 comments
-
Nov 6, 20242 min read
A New Era of Global Stability
As someone living outside the United States, I often hear people say that U.S. elections don’t impact us directly. But I see things...
38 views0 comments
-
Nov 5, 20247 min read
Azure(Tenant Logs) : A Guide for IR
In cloud-based environments like Azure, maintaining comprehensive visibility over all activities is essential for securing your...
36 views0 comments
-
Nov 4, 20245 min read
Understanding VM Types and Azure Network for IR
Microsoft Azure provides a wide range of compute services, organized based on workload types and categorized as Infrastructure as a...
71 views0 comments
-
Nov 3, 202411 min read
Azure Resource Groups and Role-Based Access Control: A Guide for IR
Microsoft Azure is a vast ecosystem of cloud-based services and tools, offering almost limitless possibilities for building, managing,...
26 views0 comments
-
Nov 1, 20247 min read
"Step-by-Step Guide to Uncovering Threats with Volatility: A Beginner’s Memory Forensics Walkthrough"
Alright, let’s dive into a straightforward guide to memory analysis using Volatility. Memory forensics is a vast field, but I’ll take you...
75 views0 comments
-
Oct 31, 20245 min read
MemProcFS/MemProcFS Analyzer: Comprehensive Analysis Guide
MemProcFS Â is a powerful memory forensics tool that allows forensic investigators to mount raw memory images as a virtual file system ....
141 views0 comments
-
Oct 30, 20244 min read
Memory Forensics Using Strings and Bstrings: A Comprehensive Guide
Memory forensics  involves extracting and analyzing data from a computer's volatile memory (RAM) to identify potential Indicators of...
122 views0 comments
-
Oct 28, 20248 min read
Fileless Malware || LOLBAS || LOLBAS Hunting Using Prefetch, Event Logs, and Sysmon
Fileless malware refers to malicious software that does not rely on traditional executable files on the filesystem , but it is important...
151 views0 comments
-
Oct 26, 20245 min read
Leveraging Automation in AWS for Digital Forensics and Incident Response
For those of us working in digital forensics  and incident response (DFIR) , keeping up with the cloud revolution can feel overwhelming...
37 views0 comments
-
Oct 25, 20247 min read
Optimizing AWS Cloud Incident Response with Flow Logs, Traffic Mirroring, and Automated Forensics
When it comes to managing networks—whether on-premise or in the cloud—one of the biggest challenges is understanding what’s happening...
24 views0 comments
-
Oct 24, 20246 min read
AWS Security Incident Response Guide: A Dive into CloudWatch, GuardDuty, and Amazon Detective
AWS’s very own Security Incident Response Guide .  While I’ll cover some of the main highlights here, it’s worth taking a full look...
51 views0 comments
-
Oct 23, 20245 min read
Power of AWS: EC2, AMIs, and Secure Cloud Storage Solutions
AWS Regions and API Endpoints Amazon Web Services (AWS) Â is a cloud platform offering a vast array of services that can be accessed and...
30 views0 comments
-
Oct 22, 20248 min read
AWS: Understanding Accounts, Roles,Secure Access and AWS Instance Metadata Service (IMDS) and the Capital One Breach
Amazon Web Services (AWS) has grown into a powerful platform used by businesses around the world to manage their data, infrastructure,...
37 views0 comments
-
Oct 21, 20245 min read
Cloud Services: Understanding Data Exfiltration and Investigation Techniques
In today’s cybercrime landscape, attackers are increasingly turning to cloud services for data exfiltration. While this presents...
62 views0 comments
-
Oct 19, 20245 min read
Microsoft 365 Security: Understanding Built-in Detection Mechanisms and Investigating Log Events
As the landscape of cybersecurity threats evolves, protecting sensitive information stored within enterprise platforms like Microsoft 365...
43 views0 comments
bottom of page