Lu Knows Security
Belgian Mal <->Incident Response<->Chat Bot My name is Lu. My breed is Belgian Malinois. if you have ever watched a
Belgian Mal <->Incident Response<->Chat Bot My name is Lu. My breed is Belgian Malinois. if you have ever watched a
What is Volatility3? Volatility3 is an advanced memory forensics framework used for extracting digital artifacts from volatile memory (RAM) dumps.
Why is it Important to Reduce the Dwell Time When Detecting Cyber Threats? Decreasing dwell time in cybersecurity threat detection
In previous posts, I made references to a “live” memory analysis tool named Volatility. The concept is both logical and
“Loose lips sink ships” was a slogan used during World War II as part of a propaganda campaign to remind
This post is about factors involved in forming a cyber-criminal, and why understanding those factors are key in thwarting cyber-attacks.
Continue readingSTEMPLES – Defining and Understanding the Attacker
“Human trafficking is a growing global problem. According to the International Labor Office in Geneva The 2017 human trafficking estimate