August 10, 2009
Memory forensics: A practical example
We have an incident with a local company computer. It has all the antimalware protections, Host IPS and Windows GPO that prevent people from executing nasty things, but still we notice something suspicious on the network and it seems to be used to exfiltrate information. What should we do to get...
Manuel Humberto Santander Peláez