How to Recover Corrupted EVTX Log Files and Extract Information

Find out: how to recover corrupted EVTX log files recover log files directly from a memory dump Watch the full video for more details and examples. Tools for EVTX file recovery Our experts developed this particular tool because there are so few options available online for fixing EVTX files. Try our CQEVTXRecovery tool. It is […]
How Forensic Experts Use Windows Prefetch

Prefetch files offer a digital snapshot of events inside your Windows operating system (OS). Because they are created when an executable program is run from a particular location for the very first time, forensic specialists can use these files to determine what was running and when. In the event of a cyber-attack, the timeline of […]
A Look Inside the Pass-the-PRT Attack

Discover what a Primary Refresh Token is and how cyber-criminals are exploiting it in two different ways to launch Azure Active Directory attacks.
Man-in-the-middle attack – everything you need to know to perform it

Find out how Paula J, CQURE Academy CEO performs Man-in-the-middle attack, to know what to be aware of.
Don’t Take Candy or USBs from Strangers – USB attack is the serious threat

Find out how Paula J, CQURE Academy CEO performs Man-in-the-middle attack, to know what to be aware of.
The Attack That Can Fool Anyone. Don’t Ignore Social Engineering

Paula Januszkiewicz demonstrates a social engineering attack in which Evilginx is deployed to phish Microsoft Teams login credentials.
How to Bury Risk in the Sand? Configure Windows Sandbox for malware analysis

Windows Sandbox can protect your PC from malicious executables. Here’s how to install and configure it correctly from a security expert.
Back to Basics: Conditional Access in Azure Active Directory

In this beginner’s guide to conditional access in Azure Active Directory, Paula J shows how to regulate access by user, format and device type.
Back to Basics: Using PIM in Azure Active Directory Security

Paula J shows how to use Privileged Identity Management (PIM) in Azure Active Directory security to enforce just-in-time access and manage who has what roles.
Hacks Weekly #47 Memory Dump

Memory dump in general is useful in order to investigate what’s running in our system memory. Everything, all information that was running before the crash is stored in our memory. For example, if there is any kind of malicious code that is running in the memory of a legitimate process, then you would be able […]