| | How AI Forensics Is Transforming Mobile Device Investigations (2024) (sans.org) |
|
2 points by walterbell 88 days ago | past
|
| | Represent the UK Cyber Team – Nationwide Search for Elite Cyber Talent (sans.org) |
|
8 points by sharpshadow 7 months ago | past
|
| | Sift Workstation: open-source incident response and forensic tools (sans.org) |
|
1 point by transpute 10 months ago | past
|
| | Time for Password Expiration to Die (2019) (sans.org) |
|
2 points by warrenm on Feb 21, 2024 | past
|
| | Sock Puppets in OSINT (sans.org) |
|
1 point by DerekBickerton on June 14, 2023 | past
|
| | List of Sans Cheat Sheets (sans.org) |
|
1 point by trfflhntr on March 16, 2023 | past | 1 comment
|
| | SANS: Security Policy Templates (sans.org) |
|
3 points by Jiocus on April 30, 2022 | past | 1 comment
|
| | A Forensic Analysis of Android Mobile Private Browsing Artifacts (sans.org) |
|
2 points by NickRandom on April 11, 2022 | past
|
| | The List of Sans Cheat Sheets – Sans Institute (sans.org) |
|
3 points by sharjeelsayed on Aug 17, 2021 | past
|
| | Firebase: Google Cloud’s Evil Twin (sans.org) |
|
14 points by animationwill on Oct 9, 2020 | past | 1 comment
|
| | Real-Time Honeypot Forensic Investigation on a German Organized Crime Network (sans.org) |
|
2 points by Pick-A-Hill2019 on Aug 13, 2020 | past
|
| | Sans Data Incident 2020 (sans.org) |
|
2 points by secfirstmd on Aug 11, 2020 | past
|
| | IPv6 Pocket Guide [pdf] (sans.org) |
|
2 points by bottle2 on April 18, 2020 | past
|
| | Detecting DNS over HTTPS Usage (sans.org) |
|
2 points by Bender on Sept 11, 2019 | past
|
| | Applying Security Awareness to the Cyber Kill Chain (sans.org) |
|
1 point by hsnewman on April 26, 2019 | past
|
| | Congressional Report on Equifax Hack (sans.org) |
|
2 points by xtacy on Jan 16, 2019 | past
|
| | The Congressional Report on Equifax Hack (sans.org) |
|
2 points by wglb on Dec 20, 2018 | past | 1 comment
|
| | 2018 Secure DevOps: Fact or Fiction? (sans.org) |
|
1 point by selmat on Nov 17, 2018 | past
|
| | SANS Poster – White Board of Awesome Command Line Kung Fu (sans.org) |
|
1 point by eaguyhn on May 2, 2018 | past
|
| | Time for Password Expiration to Die (sans.org) |
|
3 points by kumaranvpl on Jan 5, 2018 | past
|
| | Time for Password Expiration to Die (sans.org) |
|
2 points by ohjeez on Jan 4, 2018 | past
|
| | Detecting Attacks Against the 'Internet of Things' (sans.org) |
|
2 points by cryo on April 20, 2017 | past
|
| | Security Lessons from a Power Saw (sans.org) |
|
2 points by cheiVia0 on Oct 20, 2016 | past
|
| | Security Lessons from a Power Saw (sans.org) |
|
1 point by CapitalistCartr on Oct 19, 2016 | past
|
| | Azure 0day Cross-Site Scripting with Sandbox Escape (sans.org) |
|
3 points by based2 on Aug 19, 2016 | past
|
| | Generating Hypotheses for Successful Threat Hunting (sans.org) |
|
1 point by JSeymourATL on Aug 16, 2016 | past
|
| | Intrusion Detection FAQ: How can attacker use ICMP for reconnaissance? (sans.org) |
|
2 points by archiebunker on Feb 24, 2016 | past
|
| | Confirmation of a Coordinated Attack on the Ukrainian Power Grid (sans.org) |
|
5 points by tripzilch on Jan 11, 2016 | past
|
| | Understanding Indirect Blocks in Unix File Systems (sans.org) |
|
3 points by ddeville on Oct 19, 2015 | past
|
| | Linux Based Malwares.[pdf] (sans.org) |
|
6 points by zenincognito on Aug 3, 2015 | past
|
|
|
More |