Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure

This Tech Talk Tuesday episode by Dan Gunter from Insane Forensics examines the Volt Typhoon cyberattack.
Living Off the Land: How to Hunt for and Respond to LOLBins Attacks in OT

Learn how to detect and respond to LOLBins attacks in OT environments. This guide examines the 2022 Sandworm attack, explains LOLBins techniques, and provides actionable threat detection methods.
Aviation Cybersecurity Requirements

This article provides an overview of TSA cybersecurity directives, addressing compliance requirements, recommended practices, and the importance of continuous evaluation to strengthen organizational cybersecurity.
How To Use FTK Imager To Take Disk And Memory Images For Free

Learn how to use FTK Imager, a useful free cybersecurity tool, to create disk and memory images for free.
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy

Learn how to build an effective Incident Response (IR) policy using NIST 800-61. Discover key components, roles, severity levels, and compliance strategies to protect your organization from cyber threats.
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1)

Learn how to create an effective incident response plan that goes beyond best practices and becomes a valuable tool in protecting against threats.
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements

How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements https://youtu.be/vtIe3uuABKU Exploring Process Hacker for Threat Hunting and Malware Detection In this week’s Tech Talk […]
Why MFA Won’t Protect You From Hackers

In this week’s Tech Talk Tuesday, we dive into where MFA starts to fall short—especially against nation-state and advanced persistent threat (APT) actors—and what additional steps you can take to strengthen your defenses.
PipeDream/InController: From High-Level Alert to Hands-On Threat Hunting

We’re diving into a topic that caused quite a stir in the ICS (Industrial Control Systems) security world: the PipeDream (also known as InController) toolkit.
Unmasking Lazarus Group’s macOS Malware: Threat Hunting in Operation AppleJeus

Explore how North Korea’s Lazarus Group targets macOS users through Operation AppleJeus, using fake cryptocurrency apps and LaunchD persistence. Learn key threat hunting techniques for detecting OSX malware.