Lu Knows Security
Belgian Mal <->Incident Response<->Chat Bot My name is Lu. My breed is Belgian Malinois. if you have ever watched a
Belgian Mal <->Incident Response<->Chat Bot My name is Lu. My breed is Belgian Malinois. if you have ever watched a
Why is it so difficult to detect cyber criminals hiding in computer memory? Detecting criminals hiding in computer memory poses
Chat Bot For Computer Memory Forensics a Step Forward, But… Progress with chat bot to Volatility3 , has greatly improved
Analyzing computer memory on the same computer from which the memory dump was collected can introduce several risks and limitations,
Continue readingRule #1 – Don’t Analyze on the Same Computer From Which You Collected
In a previous post, I wrote about Volatility and its use in analysis of live streaming of computer memory. In
Analyzing live memory streams can be a powerful technique for detecting cyber threats, especially advanced persistent threats (APTs) and sophisticated
Continue readingAnalysis of Live Memory Streams to Detect Cyberthreats
There is not a day that passes by, that I don’t receive a dozen or more posts on how to