Skip to main content
Hit enter to search or ESC to close
Close Search
Digital Forensics & Data Breach Services
Menu
  • Home
  • Services
    • Data Breach
      • Incident Response
      • Azure Incident Response
      • Ransomware Negotiation
      • Ransomware Recovery
      • IR Retainers
    • Forensics Services
      • Computer Forensics
      • Employee Data Theft
      • Mobile Phone Forensics
      • Trade Secret Theft
    • Offensive Security
      • Threat Hunting
      • Penetration Testing
    • Expert Witness Services
  • Company
    • About Us
    • Careers
    • Service Area
    • Faq’s
  • Who We Assist
    • Attorneys
    • Corporate Counsel
    • Government
    • Insurance Agencies
    • IT Departments
    • Law Enforcmenet
  • Resources
    • Whitepapers
    • Blog
    • Topics
  • Contact
Digital Forensics & Data Breach Services
  • Home
  • Services
    • Data Breach
      • Incident Response
      • Azure Incident Response
      • Ransomware Negotiation
      • Ransomware Recovery
      • IR Retainers
    • Forensics Services
      • Computer Forensics
      • Employee Data Theft
      • Mobile Phone Forensics
      • Trade Secret Theft
    • Offensive Security
      • Threat Hunting
      • Penetration Testing
    • Expert Witness Services
  • Company
    • About Us
    • Careers
    • Service Area
    • Faq’s
  • Who We Assist
    • Attorneys
    • Corporate Counsel
    • Government
    • Insurance Agencies
    • IT Departments
    • Law Enforcmenet
  • Resources
    • Whitepapers
    • Blog
    • Topics
  • Contact

DFIR Topics

Newest Topics
  • Sliver - The C2 Framework
  • Cobalt Strike - The C2 Framework
  • Mythic - The C2 Framework
  • Command and Control (C2) Framework
  • What is Spyware?
Popular Topics
  • Sliver - The C2 Framework
  • Cobalt Strike - The C2 Framework
  • Mythic - The C2 Framework
  • Command and Control (C2) Framework
  • What is Spyware?

Threat Actors

Topics coming soon

Cyber Attacks

  • What is Phishing?
  • What is a Distributed Denial of Service (DDoS) Attack?
  • What is Social Engineering?
  • What is Malware?
  • What is a Zero-Day Exploit?
  • What is a Trojan Horse?
  • What is a Botnet?
  • What is Spyware?
8 ARTICLES

Cyber Defense

  • What is a Firewall?
  • What is an Intrusion Prevention System (IPS)?
  • What is an Intrusion Detection System (IDS)?
  • What is Endpoint Security?
4 ARTICLES

Ransomware

  • What is Ransomware?
  • What is Encryption?
2 ARTICLES

Digital Forensics

  • What is Network Forensics?
  • What Is Digital Forensics?
  • What is an Artifact in Digital Forensics?
  • What is a Chain of Custody?
  • What is eDiscovery?
5 ARTICLES

Incident Response

  • What is a Data Breach?
1 ARTICLE

Phishing & Social Engineering

Topics coming soon

Cloud Forensics

Topics coming soon

Toolkits and Frameworks

  • Command and Control (C2) Framework
  • Mythic - The C2 Framework
  • Cobalt Strike - The C2 Framework
  • Sliver - The C2 Framework
4 ARTICLES

Malware Analysis

Topics coming soon

Threat intelligence

Topics coming soon

Cyber Espionage

Topics coming soon

Help Links

Need assistance or have questions? Explore our list of resources below.

Contact Cyber Centaurs

Suffering from a corporate data breach or require a digital forensics investigation? We are available to assist.

Contact Us
Internet Crime Complaint Center

The FBI's The Internet Crime Complaint Center (IC3) is the central hub for reporting cybercrime.

Internet Crime Complaint Center
FTC Data Breach Resources

For regulatory information regarding data breaches visits the Federal Trade Commission's data breach resources page.

FTC Data Breach Resources