Nived SawantIncident Response and Threat hunting using Velociraptor — Pt.2Ever had a cyber incident and didn’t know where to start? Meet VelociraptorJun 27Jun 27
Nived SawantThreat hunting series — Pt1Learning to threat hunt using open-source tools, as opposed to relying solely on EDR and SIEM, offers a more agile and cost-effective…Jan 12Jan 12
Nived SawantLinux Memory Acquisition with LiMEThere are several memory acquisition tools available for Linux but using them doesn’t necessarily have to be difficult. In this article we…Jan 61Jan 61
Nived SawantNavigating Through the Clutter of Your Junk FolderThe joys of working in Cyber Security….Jan 5Jan 5
Nived SawantIncident Response and Threat hunting using Velociraptor — Pt.1Velociraptor is an open-source tool for collecting host-related information using The Velociraptor Query Language (VQL) queries.Jan 4Jan 4
Nived SawantUsing Live Response in MDE for IR and forensics.What is Live response in Microsoft Defender for Endpoint:Dec 22, 2023Dec 22, 2023
Nived SawantHunting Ransomware-Associated Patterns: A KQL-Based ApproachIntroduction:Dec 19, 20232Dec 19, 20232