How to Bury Risk in the Sand? Configure Windows Sandbox for malware analysis

Don’t Take Candy or USBs from Strangers – USB attack is the serious threat
Man-in-the-middle attack – everything you need to know to perform it

A Look Inside the Pass-the-PRT Attack

How to Recover Corrupted EVTX Log Files and Extract Information
