Knowing the common web vulnerabilities is great, but often it is hard to think of specific examples that appear in popular news to show the layman the relevance of these issues.
Introduction
Timeline analysis is helpful for many types of investigations and is frequently used to answer questions about activities that happened before or after a given event. I typically use log2timeline or…
Before we get started, I would like to a moment to thank Chris Pogue, CISO at Nuix, to allow us to…
Enabling Microsoft Protected View
A new Zero-day attack on Microsoft Office, affecting all current Office versions on all Windows operating systems was detected by Mcafee…