Forensics Analysis

Live Forensics Analysis with Computer Volatile Memory

The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted  in electronic or magnetic form (that is, digital evidence) Forensics Analysis - Volatile Data: The data that is held in temporary storage...
Intrusion Prevention System

Intrusion Prevention System(IPS) and Its Detailed Function – SOC/SIEM

Like an intrusion detection system (IDS), an intrusion prevention system (IPS) screens network traffic.An Intrusion Prevention System (IPS) is a framework that screens a network for evil exercises, for example, security dangers or policy compliance. Vulnerability exploits normally come in the...
Intrusion Detection System (IDS)

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations. An IDS works by monitoring system...
Windows Registry Analysis-Tracking Every activity

Windows Registry Analysis – Tracking Everything You Do on the System

The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it holds.Today most administrators and forensic analysts, the registry probably looks like the entrance to a dark. Besides Configuration...
SOC

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of compromise become visible. Use of IoAs provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers...

Artificial Intelligence for Security Operations

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended