Recent blog posts

Understanding the Ransomware Lifecycle
Ben Gonsalves 14/04/2026

Understanding the Ransomware Lifecycle

Ransomware attacks rarely happen all at once. They follow a series of stages that unfold over time, from initial access to data exfiltration and encryption. Understanding this lifecycle helps analysts spot threats earlier, respond more effectively, and focus on the stages where intervention makes the biggest difference.

What Actually Causes SOC Churn (Beyond Salary)
Joshua Beaman 22/04/2026

What Actually Causes SOC Churn (Beyond Salary)

Often, salary is blamed for SOC churn, but in reality it often is not the primary reason SOC analysts leave. There can be multiple frustrations from unclear expectations to limited progression that may play a bigger role. Lets break down what some of the underlining reasons for churn are and...

All posts

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.

Logging Windows file tampering attempts
John Jonusauskas 30/10/2024

Logging Windows file tampering attempts

Imagine you’re working in a company, and an insider threat tampers with a critical file, like a financial document or a system configuration file. If you don’t know who, when, or what was modified, you may not even realize something is wrong until it’s too late. This can lead to...