
Investigating compromised CISCO Routers and Switches
Historically, attackers targeted network devices for DoS, but now they exploit these devices like any other endpoints
Historically, attackers targeted network devices for DoS, but now they exploit these devices like any other endpoints
Getting started with evidence collection when responding to an incident involving a Palo Alto Firewall.
Revisiting Windows forensics Evidence of Execution artifacts (Windows 10 & later releases)
Detection Engineering Using YARA.