Visibility is everything in cyber security. Let’s increase the visibility of suspicious activity in your environment in 1…
AWS is becoming more and more prevalent in DFIR casework. In addition to requests for acquiring data from services…
Today we have another short post, focused on two different approaches used for similarity analysis (aka Fuzzy hashing)…
To follow up on the prior post discussing bash tips & tricks here are a few…