top of page


The Big Data Blog


CE SentinelOne Assistant : New Features
Part 1: https://www.cyberengage.org/post/meet-the-ce-sentinelone-assistant-i-built-it-for-myself-but-you-can-try-it-too 1. DFIR Investigation Tab The DFIR Investigation tab is the biggest addition to the CE S1 Assistant since launch. It takes a completely different approach to the problem — instead of helping you write queries to find things, it analyses logs you already have. Here is the workflow it was built around. You get an alert. You open SentinelOne Deep Visibility and
4 days ago9 min read


The Run Dialog: Small Key, Loud Evidence
Press Windows + R. Type something. Hit Enter. That's it — that's the entire user interaction. What happens in the registry afterward is far more interesting. The Run dialog has existed since Windows XP and hasn't changed much since. It's the power user's shortcut — a quick way to launch applications, open specific paths, fire up system tools, or connect to network resources without touching a mouse. Most casual users have never opened it. The ones who have tend to use it con
6 days ago2 min read


Enabling Auditing, Logging and Log explorer in Google Cloud
(How logs are generated, why they matter, and how investigators actually use them) Big picture Before you can analyze logs , you need to understand where logs even come from in Google Cloud. Google Cloud generates logs in two fundamental ways : Platform-level Audit Logs → Logs generated automatically by Google Cloud itself Application / workload logs → Logs generated by what you run (VMs, apps, network traffic, etc.) From a DFIR point of view: Audit Logs tell you “what chan
Mar 256 min read


Service Accounts in Google Cloud
The core idea In Google Cloud, Service Accounts are identities for machines , not humans .They are used by resources like VMs, Cloud Functions, Kubernetes, etc. to talk to other Google Cloud services. Unlike AWS (where users can directly generate API keys), Google Cloud forces you to use Service Accounts when you want: Programmatic access Static credentials Non-interactive authentication So:👉 If code needs access, it almost always runs as a Service Account. ---------------
Mar 253 min read


Detecting Time Manipulation in Windows — You Don't Always Need Full Forensics
Okay so if you've been following along, I've already written about timestomping and time manipulation from a forensics angle — both for Linux and Windows. Links below if you missed those: Linux: https://www.cyberengage.org/post/timestomping-in-linux-techniques-detection-and-forensic-insights Windows: https://www.cyberengage.org/post/anti-forensics-timestomping But today I want to talk about something a little different. What if you didn't have to go full forensics mode to cat
Mar 194 min read
Ready to discuss:
- Schedule a call for a consultation
- Message me via "Let's Chat" for quick questions
Let's connect!
bottom of page