DFIR
-
VMware

RansomHub Ransomware VS SentinelOne – Protection
In this video, we show you how the SentinelOne Singularity XDR detects and mitigates RansomHub ransomware, a group that emerged in early February 2024 initially as a simple data leak site (DLS). Key Highlights: -Their focus mirrors other historically well-known operations such as REvil, ALPHV, and Play with regards to their core values and overall mission statements. -They operate as…
Read More » -
VMware

Security Onion 2.4 Standalone Setup
Howto install Security Onion 2.4 Standalone [ad_2] source
Read More » -
VMware

Strategies for Active Defense against Pre-Ransomware and Ransomware Attacks
SANS Ransomware Summit 2024 Defending Against the Cyber Siege: Strategies for Active Defense against Pre-Ransomware and Ransomware Attacks Syed Zaidi, Senior Incident Response Analyst, Sophos As the threat landscape continues to evolve, organizations face an ever-growing risk of falling victim to ransomware attacks. These malicious attacks not only jeopardize sensitive data but also threaten business continuity and financial stability. In…
Read More » Mounting Linux Disk Images in Windows
Learn how to mount Linux disk images in Windows using the Windows Subsystem for Linux (WSL). We’ll tackle common issues and their fixes. ⌨️ Command used in the video: sudo mount -o ro,loop,offset=[OFFSET],noload [IMAGE] /mnt/[MOUNTPOINT] If you’re mounting images containing Logical Volume Management (LVM) volumes, additional steps are required: ✅ Create a loop device from the disk image: sudo losetup…
Read More »Microsoft Virtual PC 2007
THIS IS FOR EDUCATIONAL PURPOSES YT I AM NOT ENCOURAGING PIRACY!!! Application : VMware Workstation 17.5 yes i … [ad_2] source
Read More »Ransomware Running Wild in the Cloud
Threat actors evolved their methods conducting ransomware attacks in the cloud and on-premise during 2023 and show no signs of stopping. This discussion addresses initial access factors and threat actor trends associated with cloud ransomware attacks, including a shift to server-side exploits and prioritization of data exfiltration over data encryption. Content also includes notable incidents, attack models, and examples of…
Read More »


