Bernardo's Blog
2026-05-11
Reconstruct a wiper malware attack by analyzing registry, event logs, and USN journal artifacts using Registry Explorer, Event Log Explorer, and VirusTotal.
2026-05-07
BYOD Defenders Walkthrough