Incident-Response

Active Cyber Defence - Taking back control

Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 2)

Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 1)

Hunting the Snake: An Overview of Threat Hunting with Velociraptor

Butting Heads with a Threat Actor on an Engagement

No Logs? No Problem! Incident Response without Windows Event Logs

PowerShell Jobs

Running Once, <del>Running Twice</del>, Pwned! Windows Registry Run Keys

Short introduction to Network Forensics and Indicators of Compromise (IoC)