Incident Response for Linux: Challenges and Strategies
Navigating Velociraptor: A Step-by-Step Guide
Setting Up Velociraptor for Forensic Analysis in a Home Lab
Exploring Velociraptor: A Versatile Tool for Incident Response and Digital Forensics
Power of Cyber Deception: Advanced Techniques for Thwarting Attackers
Real Difference Between Containment and Remediation in Cybersecurity Incidents
Uncovering Autostart Locations in Windows
Understanding Windows Registry Control Sets: ControlSet001, ControlSet002, and CurrentControlSet
Automating Registry Analysis with RECmd
Aurora Incident Response: A Powerful Open-Source Tool for Investigators
The Rise of the Bots in Cybersecurity
Worms and Bots: What Should You Take Away?
The Evolution and Impact of Worms in Cybersecurity
Evolution of UNIX and Linux Password Storage
Obtaining Windows Domain Controller Hashes
Forensic Investigation: Techniques and Tools for Effective Threat Hunting
What to Do After a Ransomware Attack
Final Phase of a Ransomware Attack: Impact and Recovery Challenges
Mastering Threat Detection/Hunting with Specific Queries
Ransomware Actors Access and Stage Data for Exfiltration