Incident Response 12
- Malware-as-a-Smart-Contract – Part 1: Weaponising BSC to Target Windows Users via WordPress
- The Anatomy of a Phishing Investigation: How Attackers Exploit Health-Related Fears
- BCP, as easy as ABC?
- Active Cyber Defence – Taking back control
- Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 2)
- Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 1)
- Hunting the Snake: An Overview of Threat Hunting with Velociraptor
- Butting Heads with a Threat Actor on an Engagement
- No Logs? No Problem! Incident Response without Windows Event Logs
- PowerShell Jobs
- Running Once, Running Twice, Pwned! Windows Registry Run Keys
- Short introduction to Network Forensics and Indicators of Compromise (IoC)