Key Requirements for Forensic Features in SIEM Solutions
This article covers the implementation of forensic features in SIEM solutions and the key requirements to ensure admissibility of data in court.
This article covers the implementation of forensic features in SIEM solutions and the key requirements to ensure admissibility of data in court.
Learn how to create a simple Qt QML application and build it with CMake.
Compare deep learning vs machine learning and understand better the difference between these approaches and their applications.
If you ever need to mock global functions or methods with more than 10 arguments, check out our solution on GitHub.
How we have increased mhookโs performance, enhanced its capabilities and eliminated certain bugs.
Learn about the current state of ransomware and what techniques can be used to detect zero-day ransomware attacks
Learn how to find kernel symbols in syscall table for identifying and hooking functions by using kprobes
Minifilter driver to organize in-flight file encryption - architecture and implementation tips
Learn about zero-day attacks and zero-day exploits, including four main techniques used in detecting and preventing them.
Learn how to modify HTTP traffic via using hooks or creating your own custom driver.
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.