How to Bury Risk in the Sand? Configure Windows Sandbox for malware analysis
Don’t Take Candy or USBs from Strangers – USB attack is the serious threat
Man-in-the-middle attack – everything you need to know to perform it
A Look Inside the Pass-the-PRT Attack
How to Recover Corrupted EVTX Log Files and Extract Information