Digital Breadcrumbs in Memory: Unmasking a Web Server Compromise
It started like many incident response cases: an urgent Security Operation Center (SOC) alert.
It started like many incident response cases: an urgent Security Operation Center (SOC) alert.
Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving...
Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.
Digital forensics is a niche field within cybersecurity, and its subfield, “Browser Forensics,” is less known. Despite that, it is a crucial skill as it can provide abundant information to investigators.
It started like many incident response cases: an urgent Security Operation Center (SOC) alert.
Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.
Digital forensics is a niche field within cybersecurity, and its subfield, “Browser Forensics,” is less known. Despite that, it is a crucial skill as it can provide abundant information to investigators.
Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.
We decided to experiment: How effective is data exfiltration via RDP?
Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...