Unseen Risks: Navigating Hidden Threats in NPM, NuGet, PIP, Chrome Extensions, and Docker Images for Everyday Tasks

- Posted in Other by
Background: There are situations when developers and non-technical users encounter tasks that require simple solutions. Instead of handling everything on their own, they often rely on ready-made [...] Read more

Forensic Analysis Preparation: Preserving Logs in Windows Cloud Environments [ PART 3 ]

- Posted in Incident Response by
Background: In contrast to classic logging systems that preserve on-premises data, cloud systems require some familiarity with the components provided by cloud vendors. To prepare for cloud [...] Read more

Forensic Analysis Preparation for Windows Operating Systems in Incident Response: Utilizing Volatility for Memory Analysis [ PART 2 ]

- Posted in Incident Response by
Background: In our previous article, we discussed the preparation needed for the "log collection" stage of incident response, which is essential for the "analysis" stage. We covered how to prepare [...] Read more

Forensic Analysis Preparation of Windows Operating Systems in Incident Response [ PART 1 ]

- Posted in Incident Response by
Background: During incident response, one often encounters situations requiring the acquisition of logs for forensic analysis to assess the impact of an incident. There are three primary methods for [...] Read more