Digital Forensic Survival Podcast
info_outlineDigital Forensic Survival Podcast
info_outlineDigital Forensic Survival Podcast
info_outlineDigital Forensic Survival Podcast
info_outlineDigital Forensic Survival Podcast
info_outlineDigital Forensic Survival Podcast
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
info_outlineDigital Forensic Survival Podcast
In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
info_outlineDigital Forensic Survival Podcast
This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
info_outlineDigital Forensic Survival Podcast
In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
info_outlineDigital Forensic Survival Podcast
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...
info_outlineRansomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you regain control. Follow these guidelines to effectively mitigate the damage from the very start.