top of page


The Big Data Blog


Volatility Plugins — Plugin windows.malfind Let’s Talk About it
Let’s get into Second Plugin windows.malfind — my favorite plugin when I want to quickly spot weird injected memory in a process. What malfind Actually Does malfind looks for two suspicious things inside process memory: Memory region is executable → PAGE_EXECUTE_READWRITE or similar permissions→ This is already a red flag because legit apps rarely need RWX memory. Memory region is NOT mapped to a file on disk → Meaning the process has code in memory that didn’t come from an
Dec 16, 20254 min read


Volatility Plugins — Plugin windows.handles Let’s Talk About it
So yeah… I know I already wrote a bunch of blogs on memory forensics — Volatility step‑by‑step, code injection, rootkits, all of that. And you might be wondering: “Bro, why are we still talking about memory forensics?” Well… because some Volatility plugins are actually important , a bit tricky, and very underrated. Everyone knows the basics like psscan , pslist , dlllist , etc. If not — go check my earlier guide, I won’t repeat the boring stuff here. https://www.cyberengage.o
Dec 15, 20253 min read


Memory Forensic vs EDR – Talk
If you look at how cybersecurity has evolved over the past few years, one thing becomes very clear: we finally have the horsepower to see what’s actually happening on our systems in real time. Thanks to cheaper storage, faster processing, and advances in forensics, we can now monitor both live and historical activity like never before. And that visibility isn’t just for show — we can act on it, whether automatically or manually, before attackers get too comfortable. A big par
Dec 8, 20253 min read


Dropzone AI Final Conclusion – What All These Examples Really Show
Now that I’ve shown you investigations from Panther — I think you can clearly see what Dropzone AI is actually doing behind the scenes. No matter which security tool generates the alert: Dropzone picks it up instantly Investigates it faster than any human Asks all the important questions automatically Pulls evidence from everywhere Checks historical behaviour Compares with analyst verdicts Correlates with MITRE framework And finally gives you a clear conclusion All of this h
Nov 18, 20252 min read


Deep Dive: How Dropzone AI Investigates Alerts (Example Explained)
In the previous article, I explained the Dropzone AI dashboard and overall features. Now, let’s get into the real action — how Dropzone actually investigates an alert , using Panther as the example. Let’s begin. How Alerts Flow From Panther → Dropzone Let’s say you’ve integrated: Panther data source Panther alert source This means: Every alert Panther generates will be picked up automatically by Dropzone. No manual work. No need to forward anything. Dropzone grabs the alert
Nov 17, 20254 min read
Ready to discuss:
- Schedule a call for a consultation
- Message me via "Let's Chat" for quick questions
Let's connect!
bottom of page