Linux Memory Forensics Part 1 - Memory Acquisition
In this post we demonstrate the memory acquisition process.
Linux Memory Forensics Part 2 - Detection Of Malicious Artifacts
In this post, we describe detection methods of malicious artifacts on Linux memory dump using the tool Volatility.
A Glimpse Into Our Incident Response OT Training
We want to share with you one of the IR exercises in our training. This training combines practical OT and IT attacks and we are sure you can learn some new concepts and ideas.