
NobisD
Explore -Latest posts
View allUsing cybersecurity graphs for DFIR, detection and threat hunting
Why modeling logs, attack paths and investigation pivots as graphs can help defenders in DFIR, detection and threat hunting.
18/05/2026
Forensics at Scale: Using Dissect and ELK for Efficient Investigations
How to use Dissect and ELK to conduct large-scale forensic operations across multiple evidence files
06/04/2026
Active Directory DFIR investigation: analyzing a PCAP with Zeek, SMB, RDP and DPAPI
Full network investigation in an Active Directory environment. Detecting initial access, lateral movement, and more.
27/02/2026