Lateral Movement in Cyber Attacks: Key Protocols, Tools, and Detection Methods
Strengthening Defense: Securing Privileged Accounts Against Advanced Attack Tactics
Analyzing and Extracting Bitmap Cache Files from RDP Sessions
Active Directory Attacks: A Dive into Ransomware Tactics
Persistence: The Art of Staying Hidden
Dark Side of Scripting: How Ransomware Abuses Powerful Tools
Ransomware Tactics: Leveraging Legitimate Tools and Advanced Techniques
Understanding Infection Vectors in Ransomware Attacks
Enhancing Your Logging Capabilities with Sysmon for ransomware/Any type of attack
Enhancing Windows Security with Log-MD
Tools for Ransomware Analysis and Response
Windows Environment Variables for Ransomware Analysis
Ransomware Analysis: A Examiner’s Guide
Understanding Ransomware Hosting and Affiliate Programs
Running Plaso/Log2Timeline on Windows
How Ransomware Operators Communicate and Share Data
Understanding the Ransomware Extortion Types, DLSs, Resources
Ever-Evolving World of Ransomware: Evolution Over Time
Understanding Ransomware-as-a-Service (RaaS) Part 4: RaaS Dashboards and Darknet Marketplaces
Understanding Ransomware-as-a-Service (RaaS) Part 3: Exploring Ransomware Builders