Blog

Categories

Investigating suspicious AnyDesk use.

DFIR Next Steps: Suspicious AnyDesk Use

Start Reading

Cyber Triage 3.15: Import Defender Telemetry + More SOC Features

Start Reading

DFIR Next Steps: Suspicious LogMeIn Use

Start Reading

DFIR Next Steps: Suspicious TeamViewer Use

Start Reading

3 Ways to Automate Investigations.

3 Ways to Make Digital Investigations Faster with Automation

Start Reading

Windows Registry Forensics 2025

Start Reading

NTUSER.DAT Forensics Analysis 2025

Start Reading

Scope with Velociraptor. Analyze with Cyber Triage.

Start Reading

Windows Registry Forensics Cheat Sheet 2025

Start Reading

SOC Investigations 2025: Clues Are Key

Start Reading

3.14 Release Brings New UIs, Hayabusa, Baselining, and Much More

Start Reading

ShimCache and AmCache Forensic Analysis 2025

Start Reading