Forensics 4
- Malware-as-a-Smart-Contract – Part 1: Weaponising BSC to Target Windows Users via WordPress
- Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 2)
- Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 1)
- No Logs? No Problem! Incident Response without Windows Event Logs