Embrace the Chunk
It is true that anyone can be a prompt engineer. That is until something does not work properly. Then those
Reducing Threat Detection Time Through Automation
It is true that anyone can be a prompt engineer. That is until something does not work properly. Then those
Just a quick update from Lu. In a previous post, I wrote about leveraging a chat bot to shorten dwell
Belgian Mal <->Incident Response<->Chat Bot My name is Lu. My breed is Belgian Malinois. if you have ever watched a
Absolutely Confident There is absolutely no way that you can hack my desktop, tablet, laptop, cell phone, whatever. There is
Why is it so difficult to detect cyber criminals hiding in computer memory? Detecting criminals hiding in computer memory poses
Chat Bot For Computer Memory Forensics a Step Forward, But… Progress with chat bot to Volatility3 , has greatly improved
Accessing Volatility3 Via Chat Bot Introduction This post is about making it easier to use Volatility3 with a chat bot.
How to Level the Playing Field Why is access to a computer, laptop,tablet, cell phone and Internet access so important
What is Volatility3? Volatility3 is an advanced memory forensics framework used for extracting digital artifacts from volatile memory (RAM) dumps.
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to