Cynor Sense1 day ago4 min readAutomating DFIR with Velociraptor, Jupyter Notebook, and Neo4j: Part 1Get started with Knowledge graphs and RAG's. AI for velociraptor.
Cynor SenseApr 25, 20236 min readMDR: Unveiling Image-Load & Registry (Part 5)Unveiling Image-Load & Registry malicious activity using VQL #VelociraptorIR and #WindowsDefender
Cynor SenseApr 20, 20235 min readEDR : Architecture & Solutions (Part1)EDR monitors and detects cyber threats, providing real-time analysis and protection against advanced malware and targeted attacks.
Cynor SenseJul 30, 20227 min readForensics: How to guide? Disk forensics, data recovery, evidence of execution are important steps of cyber investigation
Cynor SenseJul 5, 20226 min readBenefits of cyber security for Small Enterprises?Essential tips for data security for SMEs
Cynor SenseJul 3, 20223 min readArtificial Ignorance AnalysisBy request, here’s a quick how-to on log scanning via artificial ignorance. 🙂
Cynor SenseJul 3, 20225 min readPenetration testing online. Website penetration testing.The goal of a penetration test is to test the security of a computer system by simulating an attack on it. A penetration tester uses the...