top of page
Search


Windows Threat Detection: Discovery, Collection, and Ingress Tool Transfer
Attackers don’t stop after breaching a system — they start exploring, collecting, and arming themselves. This second part of Windows Threat Detection reveals how discovery, data collection, and tool transfer unfold through real-world cases and Windows telemetry.

DFIRHive
Oct 265 min read


Windows Threat Detection: A DFIR Guide to RDP, Phishing, and USB Attacks
Every major breach begins with a single step — initial access. Whether it’s an exposed RDP port, a phishing attachment, or an infected USB, attackers leave traces in Windows telemetry that can reveal their every move. This blog walks through real-world detection techniques using native event logs and Sysmon, inspired by the TryHackMe Windows Threat Detection labs. Learn how to recognize early indicators of compromise before ransomware or data theft ever begins.

DFIRHive
Oct 265 min read
bottom of page
