How to Use Volatility in Memory Forensics | TryHackMe Critical The post provides a detailed overview of memory forensics, a key aspect of cybersecurity. It focuses on how volatile memory, particularly…
Windows Forensics With Autopsy & Registry Explorer | TryHackMe Unattended This article provided a walkthrough for the “unattended” challenge from TryHackMe, which focuses on Windows forensics.
Defensive Security Explained | TryHackMe Intro to Defensive Security The article provides an introduction to defensive security, emphasizing the role of blue teams in protecting systems against threats. Key…
Do You Need a College Degree to Get Into Cyber Security? The post explains that a college degree is not strictly necessary to enter the field of cybersecurity, although it can be helpful. Many…
The Ransomware that helped its victim restore her files | TryHackMe Retracted The video is a walkthrough of the Retracted room from TryHackMe, which focuses on a ransomware case study. The ransomware addressed in this…
How to Use Wazuh SIEM to Investigate Cyber Attacks | TryHackMe Monday Monitor The video is a tutorial on how to use Wazuh for investigating cyber incidents. The video walks through a real-life cyber attack on “Swift…