top of page

Search


Evil on Schedule: Investigating Malicious Windows Scheduled Tasks
Discover how to detect and analyze malicious Windows Scheduled Tasks with real-world examples, event log artifacts, and forensics tips.
4 days ago10 min read


AnyDesk - Investigating Threat Actors Favorite Tool
AnyDesk is a commonly abused, but legitimate RMM tool. Learn about the artifacts left behind and how to investigate AnyDesk abuse.
Mar 127 min read


A BITS of a Problem - Investigating BITS Jobs
Investigate BITS jobs and identify the event logs and database associated with this!
Jan 78 min read


Lateral Movement - Remote Desktop Protocol (RDP) Artifacts
Learn about the various artifacts created to help investigate lateral movement via RDP on both the source and target system
Nov 18, 202410 min read
bottom of page