Tech Talk Tuesday
How To Use FTK Imager To Take Disk And Memory Images For Free
Unlock the power of digital forensics with FTK Imager! In this week’s #TechTalkTuesday, we’ll show…
IR Plan, Policy & Procedures Part 3: How To Write a Cybersecurity Incident Response Procedures
Over the past two #TechTalkTuesday we talked through how to build an incident response plan…
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy
Last #TechTalkTuesday we discussed how to build an incident response plan. This week, we pivot…
IR Plan, Policy & Procedures Part 1: How To Write a Cybersecurity Incident Response Plan
An incident response plan is vital when an attack does impact an organization. In this…
Breaking Into Industrial Cybersecurity: What It Is, How To Get Into The Field, And Common Mistakes
Aaron Crow went from being OT tech support within a power generation facility to being…
How To Use Process Hacker to Explore Malicious Service and Network Activity During DFIR/Threat Hunts
In this week’s #techtalktuesday we continue last week’s series on the free, dynamic analysis tool…
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements
Process Hacker is a free and powerful tool for identifying the behaviors associated with an…
How To Use User Agents to Save The World (And Improve Cyber Threat Hunting and Detection)
User agents are a core part of the HTTP specification and can baseline user activity…
How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers
In this edition of #TechTalkTuesday we explore Window’s advanced audit logging for network connections and…
How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting
How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting…
How To Threat Hunt for Malicious Account Usage Using the Windows Event Logs
The Windows event logs are a powerful funnel point for identifying hackers that leverage Windows…
How To Defend Yourself From Cybersecurity Threats When You Can’t Immediately Patch
Vulnerabilities are unavoidable. And while patches serve as permanent fixes for vulnerabilities, it’s not always…
How to Build a Raspberry Pi Based WiFi Pentesting and Cybersecurity Assessment Kit for Under $100
This week’s #TechTalkTuesday continues the WiFi penetration testing thread from last week and explores how…
How to Threat Hunt For Wireless Network Compromise
Wireless networks are a key part of many corporate and home networks. In this edition…
How to Respond to Cybersecurity Incidents: Exploring the NIST and SANS Incident Response Models
NIST’s Incident Handling Model and SANS’ PICERL Incident Response Model outline best practices when responding…