RAM Forensics for Incident Response AnalystThis blog is all about the RAM forensics & investigation, we capture memory of any compromised device at a specific point in time and…Oct 27, 2024Oct 27, 2024
Static Malware Analysis of PDF DocumentIn this blog, I have discussed about static analysis approach of malicious pdf. In Cyber world there are various type of attack vector can…Sep 3, 2023Sep 3, 2023
Web Application Cloud Security AuditingEvery business and organizations move in the direction of using cloud they store his data virtually within the underlying cloud…Feb 11, 2023Feb 11, 2023