No tags yet.
top of page
Follow "THIS JUST IN"


A Walk Down Adversary Lane - XP sp1
I’ve been in the business of IT/Security for about 30 years now and I am always looking for ways to improve my skillset and understanding...


A Walk Down Adversary Lane -XP SP1
I’ve been in the business of IT/Security for about 30 years now and I am always looking for ways to improve my skillset and understanding...


Python, IronPython, C#/.Net "OH MY" **SILENTTRINITY**
I came across this interesting tool a few weeks ago called SILENTTRINITY. Its a post-exploitation tool created in Python and leveraged...


Measuring your Defenses for Reals...
So what’s the problem? I hate stating the obvious but in this blog I’m going to anyway. Regardless of the advancements in security...


The Evolving Threat - IoT Botnets
IoT Device A widely used definition of the Internet of Things (IoT) is it that it is a network of physical devices, vehicles, structures...


Memory Forensics – Process Analysis Part 1 of 2
In a previous blog (Memory Forensics 101) I talked high level about memory forensics in general and the use of Volatility. In this blog...


Fortinet FortiGuard Labs | CUBE Conversation Feb 2018
A quick conversation with Peter Burris for a CUBE Conversation at the CUBE Studios, Palo Alto.


Memory Forensics 101 - The What, Why and How
What is it? Most people know about traditional computer forensics where you analyze the artifacts on disk such as files, folders,...


Heimdal PRO Review
Heimdal PRO - the security solution for everyone The Internet is not a safe place to navigate without a security software product...


Manage Your Blog from Your Live Site
We’ve made it quick and convenient for you to manage your blog like a boss! First Publish your site, then login directly to your live...
Recommended Reading
Search By Tags
Who's Behind The Blog
bottom of page