Logchecker – New Tool for Threat Intelligence Developed by LIFARSIntroducing The Logchecker Tool Logchecker is a new Windows and Linux tool for scanning log files, developed by LIFARS. It... KNOWLEDGE CENTER Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... IOC Checker Scans for indicators of compromise Technical Tools IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console... Evaluate Potential Exploits Network Penetration Test Device Configuration Technical Tools Virus Checker Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... BitPaymer and DoppelPaymer campaign BitPaymer Ransomware Case Study Cyber Vaccines Dridex CyberVaccine evil corp LIFARS Tech Diary Malware Analysis of Dridex Ransomware fix Technical Guide Technical Tools what is cyber vaccine Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Technical Tools Nmap Commands Cheat Sheet June 17, 2017 Overview Nmap or Network Mapper is a popular security scanning tool used for discovering hosts and computers in certain networks... Technical Tools Python Penetration Testing Cheat Sheet June 17, 2017 Python Pen Testing Overview Penetration testers, security enthusiasts, and network administrators often desire to go beyond using ready-made tools by... Technical Tools Amcache and Shimcache Forensics June 17, 2017 Amcache and Shimcache can be a powerful source of evidence to help expedite forensic investigations. These evidence can provide a timeline of which... Technical Tools EU General Data Protection Regulation June 17, 2017 EU GDPR The European Union General Data Protection Regulation[1] or commonly known as GDPR can be touted as the most... Technical Tools Indicators of Compromise June 17, 2017 In efforts to detect data breaches at a quicker and more efficient pace, indicators of compromise can play an important...
Logchecker – New Tool for Threat Intelligence Developed by LIFARSIntroducing The Logchecker Tool Logchecker is a new Windows and Linux tool for scanning log files, developed by LIFARS. It...
KNOWLEDGE CENTER Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... IOC Checker Scans for indicators of compromise Technical Tools IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console... Evaluate Potential Exploits Network Penetration Test Device Configuration Technical Tools Virus Checker Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... BitPaymer and DoppelPaymer campaign BitPaymer Ransomware Case Study Cyber Vaccines Dridex CyberVaccine evil corp LIFARS Tech Diary Malware Analysis of Dridex Ransomware fix Technical Guide Technical Tools what is cyber vaccine Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Technical Tools Nmap Commands Cheat Sheet June 17, 2017 Overview Nmap or Network Mapper is a popular security scanning tool used for discovering hosts and computers in certain networks... Technical Tools Python Penetration Testing Cheat Sheet June 17, 2017 Python Pen Testing Overview Penetration testers, security enthusiasts, and network administrators often desire to go beyond using ready-made tools by... Technical Tools Amcache and Shimcache Forensics June 17, 2017 Amcache and Shimcache can be a powerful source of evidence to help expedite forensic investigations. These evidence can provide a timeline of which... Technical Tools EU General Data Protection Regulation June 17, 2017 EU GDPR The European Union General Data Protection Regulation[1] or commonly known as GDPR can be touted as the most... Technical Tools Indicators of Compromise June 17, 2017 In efforts to detect data breaches at a quicker and more efficient pace, indicators of compromise can play an important...
Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it...
IOC Checker Scans for indicators of compromise Technical Tools IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console...
Evaluate Potential Exploits Network Penetration Test Device Configuration Technical Tools Virus Checker Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan...
BitPaymer and DoppelPaymer campaign BitPaymer Ransomware Case Study Cyber Vaccines Dridex CyberVaccine evil corp LIFARS Tech Diary Malware Analysis of Dridex Ransomware fix Technical Guide Technical Tools what is cyber vaccine Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)...
Technical Tools Nmap Commands Cheat Sheet June 17, 2017 Overview Nmap or Network Mapper is a popular security scanning tool used for discovering hosts and computers in certain networks...
Technical Tools Python Penetration Testing Cheat Sheet June 17, 2017 Python Pen Testing Overview Penetration testers, security enthusiasts, and network administrators often desire to go beyond using ready-made tools by...
Technical Tools Amcache and Shimcache Forensics June 17, 2017 Amcache and Shimcache can be a powerful source of evidence to help expedite forensic investigations. These evidence can provide a timeline of which...
Technical Tools EU General Data Protection Regulation June 17, 2017 EU GDPR The European Union General Data Protection Regulation[1] or commonly known as GDPR can be touted as the most...
Technical Tools Indicators of Compromise June 17, 2017 In efforts to detect data breaches at a quicker and more efficient pace, indicators of compromise can play an important...