• Work-life balance is a myth! Strive for work-life harmony!

    In recent years, the quest for work-life balance has often been seen as the Holy Grail of professional success and personal fulfilment. But what if I told you that work-life balance is a myth? The idea of perfectly dividing time… read more »
  • The great SOC charade

    Disclaimer: The following story is entirely fictional. Before we embark on this rollercoaster ride of hypothetical incompetence, let me assure you that any resemblance to actual persons, living or dead, or actual events is purely coincidental. Really. I mean it.… read more »
  • Favicon Forensics: hunting phishing sites with Shodan

    As phishing attacks become more sophisticated, investigators and security professionals need innovative techniques to identify and combat these threats. In this article, we look at an often overlooked method: using favicon hashes in conjunction with Shodan to uncover potential phishing… read more »
  • When automation hits the fan: a tale of CTI misadventure

    Disclaimer The following story is a work of fiction. Any resemblance to actual persons, living or dead, or actual events is purely coincidental. …Or is it? In the midst of the COVID-19 pandemic, when remote work had become the norm,… read more »
  • macOS Sequoia and DFIR: what investigators need to know

    With Apple’s upcoming release of macOS Sequoia on September 16th, the field of Digital Forensics and Incident Response faces new challenges and opportunities. Introduction to macOS Sequoia macOS Sequoia, the latest iteration of Apple’s desktop operating system, brings a host… read more »
  • Elevating every team member: the 'No One Left Behind' approach

    As teams grow more diverse and projects become increasingly complex, managers face the challenge of ensuring that every team member contributes, develops, and feels valued. My mantra in these situations is “No one should be left behind”. Understanding the “No… read more »
  • The hidden risks of Cherry-Picking in Incident Response and Digital Forensics

    Incident response and digital forensics play crucial roles in understanding, mitigating, and preventing security events. However, a common pitfall that can undermine even the most sophisticated investigative efforts is the practice of “cherry picking” – selectively choosing evidence that supports… read more »
  • Forensic acquisition of ChromeOS devices

    In recent years, ChromeOS has gained significant traction as a lightweight, cloud-focused operating system, particularly in educational and enterprise environments. The simplicity and security of ChromeOS make it an appealing choice for many users, but these same features pose unique… read more »