malwrrAug 7, 20224 minBeyond Good, Evil and Cyber SecurityFor a start, let’s question the basic assumptions the philosophers make. “Who says there is an opposition between Truth and Falsity? Or...
malwrrJul 18, 20224 minAwesome Forensic Artifacts - ChromeGoogle Chrome has become unanimous among all computer users and so, it has become a focus for the adversaries and a valuable resource for...
malwrrApr 25, 20214 minA modern take on Windows Event Log analysisU.S. Government's Office of Personnel Management (OPM) Data Breach 2013 - 2015 is one of the largest in the government sector globally,...
malwrrApr 13, 20205 minBreach Response - A RehashBefore we begin, I would recommend to the readers Data Breach Preparation and Response – by Kevvie Fowler on which this post is based on....