Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: https://thecyberriddler.com
All content for The Cyber Riddler is the property of Ahmad Almorabea and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: https://thecyberriddler.com
In this episode we scratched the surface of browser exploitation methods and we went through different techniques used by the attackers to gain access to your device. We also went through different old CVEs that have been used in the past. We hope you enjoy the episode. Twitter: @almorabeaTwitter: @CyberRiddlerWebsite: https://thecyberriddler.com
The Cyber Riddler
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: https://thecyberriddler.com