top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Ransomware Actors Access and Stage Data for Exfiltration](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 28, 20246 min read
Ransomware Actors Access and Stage Data for Exfiltration
Ransomware attacks continue to evolve, with actors using advanced tactics to access and exfiltrate sensitive data. Understanding their...
57 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Lateral Movement in Cyber Attacks: Key Protocols, Tools, and Detection Methods](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 27, 20244 min read
Lateral Movement in Cyber Attacks: Key Protocols, Tools, and Detection Methods
Lateral movement refers to how attackers move through a network after gaining initial access. This allows them to explore the...
119 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Strengthening Defense: Securing Privileged Accounts Against Advanced Attack Tactics](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 26, 20243 min read
Strengthening Defense: Securing Privileged Accounts Against Advanced Attack Tactics
In the realm of cybersecurity, one of the most targeted areas by adversaries is privileged accounts. These accounts hold elevated...
29 views0 comments
![](https://static.wixstatic.com/media/5fb032_3d7808285b754a30b19dbe5a6375d801~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_3d7808285b754a30b19dbe5a6375d801~mv2.webp)
![Analyzing and Extracting Bitmap Cache Files from RDP Sessions](https://static.wixstatic.com/media/5fb032_3d7808285b754a30b19dbe5a6375d801~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_3d7808285b754a30b19dbe5a6375d801~mv2.webp)
-
Aug 24, 20243 min read
Analyzing and Extracting Bitmap Cache Files from RDP Sessions
When dealing with Remote Desktop Protocol (RDP) sessions on Windows, one of the often overlooked yet valuable artifacts is the RDP bitmap...
197 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Active Directory Attacks: A Dive into Ransomware Tactics](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 22, 20245 min read
Active Directory Attacks: A Dive into Ransomware Tactics
Active Directory (AD) is the backbone of many corporate networks, providing centralized management of users, devices, and permissions....
53 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Persistence: The Art of Staying Hidden](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 21, 20248 min read
Persistence: The Art of Staying Hidden
In the world of ransomware, persistence is key. Once attackers gain access to a system, their goal is to maintain that access for as long...
55 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Dark Side of Scripting: How Ransomware Abuses Powerful Tools](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 20, 20243 min read
Dark Side of Scripting: How Ransomware Abuses Powerful Tools
Ransomware attacks have become increasingly sophisticated, leveraging every tool at their disposal to wreak havoc. Among these tools,...
28 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Ransomware Tactics: Leveraging Legitimate Tools and Advanced Techniques](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 19, 20244 min read
Ransomware Tactics: Leveraging Legitimate Tools and Advanced Techniques
Ransomware actors have increasingly shifted their tactics, techniques, and procedures (TTPs) to include the use of legitimate commercial...
37 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Understanding Infection Vectors in Ransomware Attacks](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 18, 20244 min read
Understanding Infection Vectors in Ransomware Attacks
Ransomware attacks have become increasingly sophisticated, with threat actors leveraging various infection vectors to gain initial access...
30 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Enhancing Your Logging Capabilities with Sysmon for ransomware/Any type of attack](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 17, 20242 min read
Enhancing Your Logging Capabilities with Sysmon for ransomware/Any type of attack
Why Sysmon? Sysmon provides detailed information about process creations, network connections, and changes to file creation time. This...
20 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Enhancing Windows Security with Log-MD](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 16, 20243 min read
Enhancing Windows Security with Log-MD
What is Log-MD? Log-MD is a security tool tailored for Windows systems. It audits log settings and advanced audit policy configurations,...
30 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Tools for Ransomware Analysis and Response](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 15, 20243 min read
Tools for Ransomware Analysis and Response
In the world of ransomware analysis and incident response, having the right tools at your disposal can make all the difference. Manual...
44 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Windows Environment Variables for Ransomware Analysis](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 14, 20242 min read
Windows Environment Variables for Ransomware Analysis
Windows environment variables are one such critical component that forensic analysts must be familiar with. These variables function like...
62 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Ransomware Analysis: A Examiner’s Guide](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 13, 20242 min read
Ransomware Analysis: A Examiner’s Guide
When it comes to forensic analysis, Windows is an incredibly revealing operating system. It leaves behind numerous traces that can...
61 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Understanding Ransomware Hosting and Affiliate Programs](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 12, 20242 min read
Understanding Ransomware Hosting and Affiliate Programs
Ransomware attacks continue to evolve, and so do the tactics used by ransomware actors. One of the key components in their operations is...
27 views0 comments
![Running Plaso/Log2Timeline on Windows](https://static.wixstatic.com/media/5fb032_f882c427bfdf41ff9d834ea1a688d59d~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_f882c427bfdf41ff9d834ea1a688d59d~mv2.webp)
-
Aug 10, 20244 min read
Running Plaso/Log2Timeline on Windows
In my previous blog, A Deep Dive into Plaso Log2Timeline Forensic Tools, I covered how to use Plaso Log2Timeline on Ubuntu and parse the...
127 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![How Ransomware Operators Communicate and Share Data](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 9, 20242 min read
How Ransomware Operators Communicate and Share Data
The darknet is a hidden part of the internet where anonymity is paramount. It's a favorite spot for ransomware operators and other...
47 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Understanding the Ransomware Extortion Types, DLSs, Resources](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 8, 20242 min read
Understanding the Ransomware Extortion Types, DLSs, Resources
Ransomware attacks are a major threat today, constantly evolving to keep victims under pressure. Types of Ransomware Extortion Data...
34 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Ever-Evolving World of Ransomware: Evolution Over Time](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 7, 20242 min read
Ever-Evolving World of Ransomware: Evolution Over Time
Ransomware is a constantly changing threat. It's like a game of whack-a-mole for researchers: as soon as you think you've understood one...
35 views0 comments
![](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
![Understanding Ransomware-as-a-Service (RaaS) Part 4: RaaS Dashboards and Darknet Marketplaces](https://static.wixstatic.com/media/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_a67cf7d714c7475f9e2f9c0a2a32f359~mv2.webp)
-
Aug 6, 20242 min read
Understanding Ransomware-as-a-Service (RaaS) Part 4: RaaS Dashboards and Darknet Marketplaces
Introduction Welcome back to our series on Ransomware-as-a-Service (RaaS)! In this post, we will explore RaaS dashboards and the role of...
33 views0 comments
bottom of page