Cybersecurity Research, Publications & Case Studies
An ATT&CK-Mapped Incident Report with Containment Plan
Background Target: Small healthcare organization. Indicators of Compromise (IOCs): Unexplained network disruptions, suspected data exfiltration, and limited insights from endpoint protection systems. Challenges: Use of fileless, memory-resident malware. Advanced...
Responding to an Advanced Attack Detected Through Memory Forensics
This case study presents a forensic investigation of a sophisticated malware attack on a client’s network. Using open-source tools, an in-depth memory forensics analysis was performed to identify malware, suspicious processes, and evidence of compromise. The incident...
Windows Advanced Threat Research
This case study presents a challenging real-world forensic investigation conducted for a client, a mid-sized IT services provider, where an attacker compromised internal systems using previously unknown vulnerabilities. The investigation relied solely on...

