
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
285 results found for "forensic"
- PowerShell Logging: Making the Invisible Visible
Understanding PowerShell Logging PowerShell isn’t just powerful for attackers — it’s also a goldmine for forensic window into the attacker’s mind/ When properly logged, PowerShell becomes one of your most valuable forensic
- Ransomware Actors Access and Stage Data for Exfiltration
Forensic Analysis of File and Folder Access From a forensic perspective, identifying which files or folders These tools leave traces in the registry, which can be useful for forensic analysis: WinZip Registry
- Who’s Using a Proxy or VPN in Your M365 Environment — and Why It Matters
Login Method for laser-focused investigations This flexibility is what makes Petra such a powerful forensic
- Part 1 : Security in DevSecOps
I come from the Incident response/Forensic side.
- Where NetFlow Either Shines or Struggles
It allows: long-term retention forensic-grade investigations zero impact on production network tooling
- The Core Principles of Successful Incident Response
On-demand visibility – Point-in-time forensic acquisitions triggered when needed.
- Part 2 -(WMI) :Detecting WMI-Based Attacks
identifying malicious activities becomes an arduous task, requiring exhaustive efforts in traditional forensics
- Exploring Linux Attack Vectors: How Cybercriminals Compromise Linux Servers
---------------------------------------------------------------------------- Attacking Linux – Anti-Forensics In recent years, attackers have become more sophisticated in their attempts to destroy forensic evidence Linux offers several powerful tools for anti-forensics , which attackers can use to cover their tracks
- The Sneakiest Phishing Trick I’ve Seen Lately — And Why Your Email Security Won’t Save You
But if you are looking for an MDR service that actually knows how to handle incident response and forensics
- Understanding Userland Hooks and Rootkits in Real-World Investigations
complete article related to Memory baseliner. https://www.cyberengage.org/post/baseline-analysis-in-memory-forensics-a-practical-guide
- Mastering Threat Detection/Hunting with Specific Queries
Whether you are working with SIEM tools, conducting threat hunting, or performing forensic analysis, winreg_default" AND key_path:"*ProfileList*" These queries form the backbone of effective threat detection and forensic
- Hayabusa.exe: Essential Commands for In-depth Log Analysis
check out below article: https://www.cyberengage.org/post/hayabusa-a-powerful-log-analysis-tool-for-forensics-and-threat-hunting











