Streamlining Cloud Log Analysis with Free Tools: Microsoft-Extractor-Suite and Microsoft-Analyzer-Suite
Streamlining Office/Microsoft 365 Log Acquisition: Tools, Scripts, and Best Practices
M365 Logging: A Guide for Incident Responders
Microsoft Cloud Services: Focus on Microsoft 365 and Azure
Forensic Challenges of Cloud-Based Investigations in Large Organizations
macOS Incident Response: Tactics, Log Analysis, and Forensic Tools
Investigating macOS Persistence :macOS stores extensive configuration data in: Key Artifacts, Launch Daemons, and Forensic Strategies"
Evidence Profiling : Key Device Information, User Accounts, and Network Settings on macOS
APFS Disk Acquisition: From Live Data Capture to Seamless Image Mounting
History of macOS and macOS File Structure
Lateral Movement: User Access Logging (UAL) Artifact
Evidence of Execution: Program Compatibility Assistant (PCA)
Identifying Legitimate vs. Suspicious Processes on Windows
Understanding Endianness and Its Importance in Forensic Analysis
Enhancing Linux Defenses: Key Areas for Cybersecurity Success
Data Collection (Key Directories) in Digital Forensics for Linux
Incident Response Log Strategy for Linux: An Essential Guide
Understanding Linux Timestamps and Key Directories in Forensic Investigations
Understanding Linux Filesystems in DFIR: Challenges and Solutions
Exploring Linux Attack Vectors: How Cybercriminals Compromise Linux Servers