Apr 166 min readRespond and Investigate a Compromised Google Workspace UserLearn how to respond and investigate a compromised Google Workspace user.
Jan 214 min readEvidence of Program Existence - ShimcacheLearn what Shimcache is, how to analyze it, and why it's misunderstood.
Aug 18, 20235 min readSysmon: When Visibility is KeyLearn why visibility is everything when responding to an incident.
Aug 12, 20235 min readA LNK To The Past: Utilizing LNK Files For Your InvestigationsWe've all heard of "Link" or "LNK" files, right? You want a faster way to open your favorite game, document or application without need...