You have been called to analyze a compromised Linux server. Figure out how the threat actor gained access, what modifications were applied to the system, and what persistent techniques were utilized. (e.g. backdoors, users, sessions, etc).
During WWHF: Deadwood 2021, I gave a presentation (shown above) on the popular tool iLEAPP: iOS Logs, Events, And Plists Parser created by Alexis Brignoni and Yogesh Khatri
Windows Defender Antivirus is the "next-generation projection" 1 [https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows?view=o365-worldwide] for Windows provided by Microsoft. It brings together "machine learning, big-data analysis, in-depth trheat
A little while back I ran across and interesting and strange issue where one of the Project Fi devices in my house was not syncing properly between the Android Message Web site and the Messaging application on the phone. I described the problem in a short twitter thread.
Recently, I passed the SEC275/GFACT certification which I received after competing in Cyber FastTrack and completing their SANS Foundations course. This certification is the beginning of SANS "Get Started in Cyber" courses.