Anthropic pays $750,000+ a year for engineers who can build LLM architectures from scratch. Stanford taught the entire thing in 1 hour lecture & released it for free.
Bookmark & watch this today before someone takes it down.
Every IR engagement starts the same painful way:
Download KAPE. Remember the flags.
Spin up Velociraptor.
Hunt for the hashing script.
Build a chain-of-custody spreadsheet from scratch.
Write the report template on the fly.
Meanwhile, the attacker has already been in the environment for days.
We built VanGuard to kill that entire tooling nightmare.
VanGuard is a single binary (Windows + Linux) that runs from a USB drive or your local machine — no installation, no dependencies, fully air-gapped.
It consolidates triage, threat hunting, memory forensics, disk collection, remote ops, and reporting into a single, clean, professional TUI.
What makes it different:
→ 28 pre-built IR use cases (ransomware, BEC, lateral movement, credential theft, rootkits) — each with full MITRE ATT&CK mapping
→ Velociraptor as a first-class citizen (server lifecycle, agent deployment, offline collectors — all from one interface)
→ Every artifact dual-hashed (MD5 + SHA256) + HMAC-SHA256 tamper-evident chain of custody
→ One-command HTML incident reports that work completely offline
→ True cross-platform: same binary handles Windows and Linux investigations
We didn’t build this as a product.
We built it because we needed it on real engagements — and as a training aid for practitioners who want to level up their DFIR skills.
👉 Landing page + screenshots: training.ridgelinecyber.com/vanguard/
👉 GitHub: github.com/ridgelinecyber…
The investigation methodology behind every VanGuard use case is taught in our Practical Incident Response course — first modules are completely free, no account required:
training.ridgelinecyber.com/modules/free/i…
Download it, run it in your lab, and let me know what you think. Star it if it helps. Issues and feedback very welcome 🔥
#DFIR#IncidentResponse#OpenSource#BlueTeam#Velociraptor
Anyone else seeing Microsoft #Defender flagging #DigiCert root certificate registry keys as malware?
We’ve seen reports that Defender signature update from April 30 added a detection called:
Trojan:Win32/Cerdigent.A!dha
In some environments, Defender apparently detected DigiCert Root CA certificate registry entries and removed them from the trust store.
The affected cert hashes mentioned so far:
0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Example path:
HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
There’s also a Reddit comment suggesting Microsoft has started restoring the certs and that admins can check this via Advanced Hunting in Defender:
DeviceRegistryEvents
| where RegistryKey contains "0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43"
or RegistryKey contains "DDFB16CD4931C973A2037D3FC83A4D7D775D05E4"
| where ActionType == "RegistryKeyCreated"
| where Timestamp > datetime(2026-05-03T04:00:00)
| project Timestamp, DeviceName, ActionType, InitiatingProcessFileName
| order by Timestamp desc
On an affected device, this can also be checked with:
certutil -store AuthRoot | findstr -i "digicert"
Could become an annoying day for admins if this spreads
reddit.com/r/cybersecurit…
@M4yFly Successfully Found my way up to Domain Admin
I made a walkthrough on how i did that here bl4ckarch.github.io/posts/GOAD-DRA…
Feel free to come and discuss about it 😉
🔥🐉 New GOAD Lab: DRACARYS
I’ve just released a new free lab environment on GOAD: DRACARYS.
The challenge includes 3 VMs and the objective is simple:
Start with no authentication and work your way up to Domain Admin.
Have fun exploiting it! 🔥🐉
mayfly277.github.io/posts/Dracarys…
We study the impact of e-money on cash demand in Indonesia. E-money adoption is associated with lower cash demand. Moreover, the effect is heterogeneous across regions and denominations.
Happy reading!
doi.org/10.1016/j.econ…
Our Preemptive Defense Blueprint for SOC Teams is your guide on exactly how to shift from reactive defense to preemptive visibility, including a 30-60-90 day checklist.
Download here 👉 hubs.ly/Q04d_-xv0#soc#siem#ciso#iofa