top of page

Search


From Chaos to Chronology: The Power of Forensic Timelines
In incident response, attackers leave behind thousands of artifacts but without context, they’re just scattered clues. Forensic timelines bring those events into order, helping investigators reconstruct the attack, identify gaps in the analysis, and understand the full story of a compromise.
Mar 99 min read


Lateral Movement - Remote Desktop Protocol (RDP) Event Logs
Identify the important Windows Event logs to hunt RDP lateral movement, both from the source and target system.
Oct 1, 20248 min read
bottom of page