Practical Steps for High Quality Threat Hunting on iOS Without a Jailbreak
One of our customers operates a large OT-IT network. As part of Threat Hunting operations on their environment, we will investigate their work phones to ensure every asset is safe from malicious activity. We want to share with you practical steps for Threat Hunting on iOS Devices.
The Practical Way to Detect Golden and Silver Ticket Attacks
In this short post, we describe the most practical detection methods of the popular Golden and Silver Ticket attacks in the Active Directory environment.
A Glimpse Into Our Incident Response OT Training
We want to share with you one of the IR exercises in our training. This training combines practical OT and IT attacks and we are sure you can learn some new concepts and ideas.
Linux Memory Forensics Part 2 - Detection Of Malicious Artifacts
In this post, we describe detection methods of malicious artifacts on Linux memory dump using the tool Volatility.
Linux Memory Forensics Part 1 - Memory Acquisition
In this post we demonstrate the memory acquisition process.