Azure Blob Container Threats & Attacks
The following post focuses on Azure Blob Container, its risks, how it builds, and how to attack with a specific scenario. Before reading this post, let me ask you a few questions and know if...
Just another day of IR, Threat-Hunting & Microsoft Security
The following post focuses on Azure Blob Container, its risks, how it builds, and how to attack with a specific scenario. Before reading this post, let me ask you a few questions and know if...
This post contains many digital forensics and incident response tools for Endpoints, Cloud vendors, and more. The tools below include open-source, commercials, and other free tools for day-to-day investigation and forensics. General Tools EnCase is...
This post is focused on the Chain of Custody in general and some of the implications of the Cloud. If you are looking for CoC scenarios and how they affect the Cloud, the following post...
The Azure AD Incident Response methodology is a critical life-cycle, process, and tool that anyone using identities on Azure, Office 365, and third-party clouds can count on. The Azure AD Incident Response explores how Azure...
The Azure AD Incident Response methodology is a critical life-cycle, process, and tool that anyone using identities on Azure, Office 365, and third-party clouds can count on. The Azure AD Incident Response explores how Azure...