Incident Response Tips

Linux Memory Forensics Part 1 - Memory Acquisition

In this post we demonstrate the memory acquisition process.

Read More

Incident Response Tips

Linux Memory Forensics Part 2 - Detection Of Malicious Artifacts

In this post, we describe detection methods of malicious artifacts on Linux memory dump using the tool Volatility.

Read More

Incident Response Tips

A Glimpse Into Our Incident Response OT Training

We want to share with you one of the IR exercises in our training. This training combines practical OT and IT attacks and we are sure you can learn some new concepts and ideas.

Read More
loader
×

OTORIO website uses cookies. By continuing to browse the site you are agreeing to our use of cookies. For more details about cookies and how to manage them, see our cookie policy.

Continue