One Way or Another…
Why is it so difficult to detect cyber criminals hiding in computer memory? Detecting criminals hiding in computer memory poses
Why is it so difficult to detect cyber criminals hiding in computer memory? Detecting criminals hiding in computer memory poses
Chat Bot For Computer Memory Forensics a Step Forward, But… Progress with chat bot to Volatility3 , has greatly improved
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Analyzing computer memory on the same computer from which the memory dump was collected can introduce several risks and limitations,
Continue readingRule #1 – Don’t Analyze on the Same Computer From Which You Collected
In a previous post, I wrote about Volatility and its use in analysis of live streaming of computer memory. In
Analyzing live memory streams can be a powerful technique for detecting cyber threats, especially advanced persistent threats (APTs) and sophisticated
Continue readingAnalysis of Live Memory Streams to Detect Cyberthreats
In previous posts, I made references to a “live” memory analysis tool named Volatility. The concept is both logical and
There is not a day that passes by, that I don’t receive a dozen or more posts on how to
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks