Eastern Asian Android Assault – FluHorse
|
|
0
|
1049
|
May 4, 2023
|
Preventing Type Confusion with CastGuard
|
|
0
|
38485
|
October 18, 2023
|
Pwn2Own – When The Latest Firmware Isn’t
|
|
0
|
35885
|
November 1, 2023
|
NetAnalysis® v3.6 and HstEx® v5.6 Released
|
|
0
|
37884
|
October 6, 2023
|
Old School MS-DOS Commands for DFIR
|
|
0
|
40418
|
September 1, 2023
|
AI Prompt Injection
|
|
0
|
35237
|
November 3, 2023
|
VMware Memory Forensics
|
|
0
|
37363
|
October 9, 2023
|
Zenbleed – AMD Side-Channel Attack Targets Vectorised Functions
|
|
0
|
39763
|
August 30, 2023
|
Creating an OPSEC safe loader for Red Team Operations
|
|
0
|
29607
|
November 29, 2023
|
Unravelling the Web: AI’s Tangled Web of Prompt Injection Woes
|
|
0
|
26888
|
December 14, 2023
|
AI Safety Summit 2023
|
|
0
|
34170
|
November 8, 2023
|
Investigating Windows Memory Is Here!
|
|
0
|
39661
|
September 8, 2023
|
An Important Change to ShellBags - Windows 11 2023 Update!
|
|
0
|
32989
|
November 13, 2023
|
Hyper-V Memory Forensics - MemProcFS to the Rescue!
|
|
0
|
26302
|
December 18, 2023
|
NetAnalysis® v3.5 and HstEx® v5.5 Released
|
|
0
|
37108
|
October 5, 2023
|
2024 Investigating Windows Courses
|
|
0
|
23902
|
January 1, 2024
|
Guiding Secure AI: NCSC’s Framework for AI System Security
|
|
0
|
19785
|
January 25, 2024
|
RDP Authentication vs. Authorization
|
|
0
|
20450
|
January 22, 2024
|
Where's the 4624? - Logon Events vs. Account Logons
|
|
0
|
14787
|
February 26, 2024
|
Para Bailar La Bambda: Contributing to Burp Suite’s New Filtering Capabilities
|
|
0
|
17769
|
February 7, 2024
|
BloreBank ChatBot – Introducing our Prompt Injection Game
|
|
0
|
14133
|
February 29, 2024
|
Introducing Yasha – Yet Another Security Header Analyser
|
|
0
|
13590
|
March 9, 2024
|
Windows Logging Service (WLS) 3.7.24 Now Available!
|
|
0
|
14599
|
February 26, 2024
|
Asset Inventory for Security Teams
|
|
0
|
15458
|
February 21, 2024
|
NetAnalysis® v3.7 and HstEx® v5.7 Released
|
|
0
|
13006
|
March 11, 2024
|
CVE-2024-25153: Remote Code Execution in Fortra FileCatalyst
|
|
0
|
12386
|
March 13, 2024
|
ETWHash – “He who listens, shall receive”
|
|
0
|
51563
|
May 3, 2023
|
Flipper Zero Experiments – Sub-GHz
|
|
0
|
48745
|
June 5, 2023
|
Detecting PsExec Usage
|
|
0
|
44014
|
July 10, 2023
|
LRQA Nettitude’s Approach to AI
|
|
0
|
44360
|
July 5, 2023
|
Anniversary Sale: 40% Off Digital Forensic Tools
|
|
0
|
39838
|
August 11, 2023
|
Malware analysis report: Smoke Loader
|
|
0
|
2194
|
March 15, 2024
|
Celebrating 21 Years of NetAnalysis®
|
|
0
|
39719
|
August 8, 2023
|
A File's Life - File Deletion and Recovery
|
|
0
|
50978
|
May 22, 2023
|
Ease Shellcode Analysis with SCLauncher! Learn how-to wrap shellcode into a PE file
|
|
0
|
2587
|
March 15, 2024
|
Online Scams: Blackmails, Deceptions, and Victims
|
|
0
|
2612
|
March 19, 2024
|
Malware Theory - Unpacking Approaches and Methods
|
|
0
|
2445
|
March 16, 2024
|
Malware Analysis — njRAT
|
|
0
|
2419
|
March 18, 2024
|
KalmarCTF 2024 – One key to rule them all
|
|
0
|
2398
|
March 18, 2024
|
2024-03-14: AsyncRAT and XWorm infection
|
|
0
|
1893
|
March 15, 2024
|
Suspicious Text Messages Alert
|
|
0
|
2640
|
March 19, 2024
|
Andariel Group Exploiting Korean Asset Management Solutions (MeshAgent)
|
|
0
|
2431
|
March 19, 2024
|
Malware development: persistence - part 24. StartupApproved. Simple C example
|
|
0
|
1978
|
March 14, 2024
|
CryptoWire with Decryption Key Included
|
|
0
|
2414
|
March 19, 2024
|
Plugin focus: ida kmdf
|
|
0
|
2279
|
March 18, 2024
|
Defense Evasion Techniques Detected by AhnLab EDR
|
|
0
|
2296
|
March 18, 2024
|
What makes a good CTF challenge?
|
|
0
|
2256
|
March 18, 2024
|
2024-03-06: Pikabot infection leads to Meduza Stealer
|
|
0
|
1875
|
March 14, 2024
|
NetAnalysis® v3.8: Enhanced Browser Support for Digital Forensic Investigations
|
|
0
|
6389
|
April 5, 2024
|
Revisiting Arsenal Image Mounter - The Ultimate Guide
|
|
0
|
7434
|
April 1, 2024
|