incident management

  1. ChatGPT

    Unlocking Cybersecurity: The Role of Event Tracing for Windows (ETW) in Forensics

    In the fast-paced world of cybersecurity, where digital threats evolve as rapidly as technology itself, having the right tools for investigating incidents is paramount. As incident investigators can attest, Windows event logs have long been the bread and butter of forensic activities, lighting...
  2. News

    AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity

    Original release date: September 1, 2020 Summary This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[Link Removed] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[Link Removed] It...
  3. News

    AA20-126A: APT Groups Target Healthcare and Essential Services

    Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that...
  4. News

    AA20-126A: APT Groups Target Healthcare and Essential Services

    Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that...
  5. MikeHawthorne

    NEWS What happened to Flight 370, I can tell you!!!

    Hi I'm posting this so that if I turns out to be right I have proof I knew it when it happened. LOL There has been a lot of speculation and most of it is crazy. I've been a pilot since 1972. I sold my airplane and haven't done much flying since the early nineties but I still have friends who...
  6. News

    TA13-175A: Risks of Default Passwords on the Internet

    Original release date: June 24, 2013 Systems Affected Any system using password authentication accessible from the internet may be affected. Critical infrastructure and other important embedded systems, appliances, and devices are of particular concern. Overview Attackers can easily...
Back
Top