Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System
The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it...
Live Cyber Forensics Analysis with Computer Volatile Memory
The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or...
Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM
An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying...
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation
What is an Indicator of Attack (IOA)
IoA's is some events that could reveal an active attack before indicators...
SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach...
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most...