Январь 2

Recovering deleted internet history from System Restore points

Windows Console Command History: Valuable Evidence for Live Response Investigation

iOS Imaging on the Cheap! – Part Deux! (for iOS 10 & 11)

Forensically Collecting Emails — 5 Things to Know

Evidence acquisition workflow in 5 steps

Defending Against an Advanced Persistent Threat (APT)

8 Steps to Start Threat Hunting

How Cyberbit Researchers Discovered a New Silent LockPoS Malware Injection Technique

Industrial Control Threat Intelligence

Using MISP to share vulnerability information efficiently

Sysmon-modular (GitHub)

Digital Forensic Analysis of Amazon Linux EC2 Instances

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

Threat Hunting for Internal RDP Brute Force Attempts

The Industrial Revolution of Lateral Movement

Unpacking Pykspa Malware With Python and IDA Pro – Subscriber Request Part 1

Memory Forensics Sodium Pentothal for Your Security

Microsoft Office DDE Detection

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

Coin Mining By Opportunistic And Automated Threats

When Scriptlets Attack: The Moniker

CSE Malware ZLab – Double Process Hollowing -The stealth process injection of the new Ursnif malware

Reputations and PCI Data Breaches

DFIR Research