top of page

Search


Respond and Investigate a Compromised Google Workspace User
Learn how to respond and investigate a compromised Google Workspace user.
Apr 16, 20246 min read

Evidence of Program Existence - Shimcache
Learn what Shimcache is, how to analyze it, and why it's misunderstood.
Jan 21, 20244 min read

Sysmon: When Visibility is Key
Learn why visibility is everything when responding to an incident.
Aug 18, 20235 min read

A LNK To The Past: Utilizing LNK Files For Your Investigations
We've all heard of "Link" or "LNK" files, right? You want a faster way to open your favorite game, document or application without need...
Aug 12, 20235 min read
bottom of page