
Incident Response and Cloud Forensics
Looking forward to presenting for EC-Council on the 7th of April 2020 - Register Now: http://ow.ly/1Sii50z1MsU
Looking forward to presenting for EC-Council on the 7th of April 2020 - Register Now: http://ow.ly/1Sii50z1MsU
It happened again, EC2 Abuse let you know you have a potentially compromised EC2 windows instance. You get into the account and there it...
Just wrapped up my first swipe at teaching my first SANS course and I thought I'd share my experience for anybody else out there who may...
The longer I do this the more I come around to using simpler and simpler tools. Yes, learning GOLANG, kurbernetes, docker, AI,...
I was lucky enough to get my ticket early to BSIDES AUSTIN this year and being the life of an Incident Handler I had to duck out of a few...
More and more Security vendors are moving to SSL interception on products. After pushing organizational certificates to browsers as...
DNS Hijacking, Cache poisoning, and a host of other issues are a continued concern when it comes to internet hygiene. Amid the government...
After taking FOR610 and taking the GREM I decided to try and write a tool or two that could be utilized for Malware Analysis. Some...
Draconian security controls, processes, and polices are stillborn or will be in the near-future. It will go the way of on-premise...
1.Introduction 1.2 Microsoft in the late 90s and at the turn of the millennium was not held in high regard as it pertains to security....
Fear Uncertainty and Doubt (FUD) works as an influence strategy by amateur cybersecurity professionals over an organization, and as a...
Antivirus is a requirement for a host of compliance standards and is championed to be a critical component for any security baseline...
Infosec, packets, technology and knowledge - all part of packetaddict.com. Here we want to share knowledge and ensure that other...