Gesamtlänge aller Episoden: 6 days 5 minutes
This week I talk about OWASP's Number 10 vulnerability category from their top 10 list, insufficient logging and monitoring.
This week I talk about the most frequently seen attacker recon commands.
This week I talk about a popular Windows utility attackers often exploit.
This week I talk about incident response in container deployments.
This week I talk about OWASP's Number 9 vulnerability category from their top 10 list, components with known vulnerabilities.
This week I talk about the challenges of working with VMEM files for memory forensics.
This week I talk about the DFIR changes on the horizon with cloud technology.
This week I talk about Intel's emerging technology called Optane end it anticipated affects on DFIR investigations.
This week I talk about OWASP's Number 8 vulnerability category from their top 10 list, insecure deserialization.