<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 16, 2026 at 9:21 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://dfirinsights.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>DFIR Insights</title>
		<link><![CDATA[https://dfirinsights.com]]></link>
		<description><![CDATA[DFIR Insights]]></description>
		<lastBuildDate><![CDATA[Wed, 27 Nov 2024 02:42:47 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://dfirinsights.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://dfirinsights.com/2024/11/27/mastering-sysmon-e-book-release/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/11/27/mastering-sysmon-e-book-release/]]></link>
			<title>Mastering Sysmon free DFIR e-book release</title>
			<pubDate><![CDATA[Wed, 27 Nov 2024 02:42:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2025/04/08/ai-prompt-engineering-for-blueteamers-and-dfir-professionals/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2025/04/08/ai-prompt-engineering-for-blueteamers-and-dfir-professionals/]]></link>
			<title>How to Use AI as a DFIR Mentor for Cyber Investigations</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 09:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/11/08/troubleshooting-log2timeline-on-ubuntu/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/11/08/troubleshooting-log2timeline-on-ubuntu/]]></link>
			<title>How to Fix Common log2timeline Issues After SANS FOR608: A Real-World Example</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 09:04:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2025/02/27/investigation-goals-in-dfir-reports/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2025/02/27/investigation-goals-in-dfir-reports/]]></link>
			<title>The Ultimate Checklist for Starting a DFIR Investigation Right</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 09:01:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/05/30/the-importance-of-preparation-in-cyber-incident-response/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/05/30/the-importance-of-preparation-in-cyber-incident-response/]]></link>
			<title>The Importance of Preparation in Cyber Incident Response</title>
			<pubDate><![CDATA[Thu, 30 May 2024 02:50:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/page-categories/]]></guid>
			<link><![CDATA[https://dfirinsights.com/page-categories/]]></link>
			<title>AI and DFIR Page Categories</title>
			<pubDate><![CDATA[Sat, 03 May 2025 23:58:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/07/09/the-role-of-incident-response-in-cyber-security/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/07/09/the-role-of-incident-response-in-cyber-security/]]></link>
			<title>The role of Incident Response in Cyber Security</title>
			<pubDate><![CDATA[Tue, 13 Aug 2024 07:54:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2025/04/10/ai-in-the-soc-what-works-what-doesnt-and-how-to-start-today/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2025/04/10/ai-in-the-soc-what-works-what-doesnt-and-how-to-start-today/]]></link>
			<title>AI in the SOC: What Works, What Doesn’t, and How to Start</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 09:19:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/07/09/introduction-to-digital-forensics-preparing-for-the-unexpected-with-volatility-wireshark-hayabusa-and-ftk-imager/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/07/09/introduction-to-digital-forensics-preparing-for-the-unexpected-with-volatility-wireshark-hayabusa-and-ftk-imager/]]></link>
			<title>Introduction to Digital Forensics: Preparing for the Unexpected with Volatility, Wireshark, Hayabusa and FTK Imager</title>
			<pubDate><![CDATA[Tue, 09 Jul 2024 22:55:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/05/01/australian-information-security-manual-updates-march-2024/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/05/01/australian-information-security-manual-updates-march-2024/]]></link>
			<title>Australian Information Security Manual Updates &#8211; March 2024</title>
			<pubDate><![CDATA[Thu, 30 May 2024 02:52:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/05/30/breaking-into-a-cybersecurity-career-training-resources-and-tips/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/05/30/breaking-into-a-cybersecurity-career-training-resources-and-tips/]]></link>
			<title>Breaking into a Cybersecurity Career: Training, Resources, and Tips</title>
			<pubDate><![CDATA[Thu, 30 May 2024 02:51:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/07/17/the-shadowy-world-of-apt40/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/07/17/the-shadowy-world-of-apt40/]]></link>
			<title>Defending Against APT40 (Leviathan): TTP&#8217;s, Detection and Defence</title>
			<pubDate><![CDATA[Thu, 18 Jul 2024 21:56:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/07/10/exploring-host-based-digital-forensics-with-memory-analysis/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/07/10/exploring-host-based-digital-forensics-with-memory-analysis/]]></link>
			<title>Exploring Host-Based Digital Forensics with Memory Analysis</title>
			<pubDate><![CDATA[Mon, 12 Aug 2024 07:34:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/07/17/phishing-detection-defence-and-response/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/07/17/phishing-detection-defence-and-response/]]></link>
			<title>Phishing Detection, Defence and Response</title>
			<pubDate><![CDATA[Mon, 12 Aug 2024 07:31:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/05/31/nist-800-61-detection-and-categorisation-of-incidents-based-on-impact-and-recoverability/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/05/31/nist-800-61-detection-and-categorisation-of-incidents-based-on-impact-and-recoverability/]]></link>
			<title>NIST 800-61 &#8211; Detection and categorisation of incidents based on impact and recoverability.</title>
			<pubDate><![CDATA[Fri, 31 May 2024 01:38:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/05/30/sysmon/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/05/30/sysmon/]]></link>
			<title>NIST 800-61 &#8211; Detection</title>
			<pubDate><![CDATA[Fri, 31 May 2024 01:36:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/09/13/ubuntu-24-04-freezes-and-locks-up-on-vmware-virtual-machine/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/09/13/ubuntu-24-04-freezes-and-locks-up-on-vmware-virtual-machine/]]></link>
			<title>Ubuntu 24.04 freezes and locks up on VMWare virtual machine</title>
			<pubDate><![CDATA[Fri, 13 Sep 2024 06:58:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/05/07/windows-remote-desktop-forensics/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/05/07/windows-remote-desktop-forensics/]]></link>
			<title>RDP Digital Forensics</title>
			<pubDate><![CDATA[Mon, 13 May 2024 07:28:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/privacy-policy/]]></guid>
			<link><![CDATA[https://dfirinsights.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Mon, 13 May 2024 07:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/04/23/basic-digital-forensics-process/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/04/23/basic-digital-forensics-process/]]></link>
			<title>Basic Digital Forensics Process</title>
			<pubDate><![CDATA[Tue, 23 Apr 2024 02:03:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2020/09/08/the-core-of-all-reporting/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2020/09/08/the-core-of-all-reporting/]]></link>
			<title>The core of all reporting</title>
			<pubDate><![CDATA[Tue, 08 Sep 2020 08:29:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/02/20/the-simple-as-pie-log2timeline-plaso-psort-syntax/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/02/20/the-simple-as-pie-log2timeline-plaso-psort-syntax/]]></link>
			<title>The simple as pie log2timeline / plaso / psort syntax</title>
			<pubDate><![CDATA[Tue, 20 Feb 2018 22:00:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/10/31/quick-fixes-for-plaso-log2timeline-error-key-troubleshooting-on-ubuntu/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/10/31/quick-fixes-for-plaso-log2timeline-error-key-troubleshooting-on-ubuntu/]]></link>
			<title>Quick Fixes for plaso / Log2timeline Error: Key Troubleshooting on Ubuntu</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 22:38:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/02/15/ftk-imager-creating-custom-content-images-with-classic-file-types/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/02/15/ftk-imager-creating-custom-content-images-with-classic-file-types/]]></link>
			<title>FTK Imager &#8211; Creating Custom Content Images with classic file types</title>
			<pubDate><![CDATA[Thu, 15 Feb 2018 04:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/02/15/mounting-raw-images-under-linux-calculating-byte-offset/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/02/15/mounting-raw-images-under-linux-calculating-byte-offset/]]></link>
			<title>Mounting Raw Images under Linux + Calculating Byte Offset!</title>
			<pubDate><![CDATA[Thu, 15 Feb 2018 02:11:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2019/07/04/opsec-at-conferences/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2019/07/04/opsec-at-conferences/]]></link>
			<title>Opsec at Conferences</title>
			<pubDate><![CDATA[Thu, 04 Jul 2019 02:08:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/05/26/finding-the-adversary-isnt-as-hard-as-you-think/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/05/26/finding-the-adversary-isnt-as-hard-as-you-think/]]></link>
			<title>Finding the adversary isn&#8217;t as hard as you think</title>
			<pubDate><![CDATA[Sat, 26 May 2018 09:14:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2020/03/30/evidence-of-file-execution/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2020/03/30/evidence-of-file-execution/]]></link>
			<title>Evidence of file execution</title>
			<pubDate><![CDATA[Mon, 30 Mar 2020 05:54:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/02/12/tool-output-examples/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/02/12/tool-output-examples/]]></link>
			<title>Tool Output Examples</title>
			<pubDate><![CDATA[Mon, 12 Feb 2018 22:26:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2019/07/01/from-tech-to-executive-communicator/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2019/07/01/from-tech-to-executive-communicator/]]></link>
			<title>From Tech to Executive Communicator</title>
			<pubDate><![CDATA[Mon, 01 Jul 2019 23:15:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2020/04/17/booting-stalkers-abusive-partners-from-your-digital-accounts/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2020/04/17/booting-stalkers-abusive-partners-from-your-digital-accounts/]]></link>
			<title>Booting stalkers / abusive partners from your digital accounts</title>
			<pubDate><![CDATA[Fri, 17 Apr 2020 00:31:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2019/04/12/getting-log2timeline-plaso-installed-on-ubuntu-18-04-with-virtual-box-6/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2019/04/12/getting-log2timeline-plaso-installed-on-ubuntu-18-04-with-virtual-box-6/]]></link>
			<title>Getting Log2timeline / Plaso Installed on Ubuntu 18.04 with Virtual Box 6</title>
			<pubDate><![CDATA[Fri, 12 Apr 2019 01:05:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/03/02/grep-what-a-beast/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/03/02/grep-what-a-beast/]]></link>
			<title>Grep &#8211; What a beast!</title>
			<pubDate><![CDATA[Fri, 02 Mar 2018 06:26:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2018/02/12/simple-volatility-syntax/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2018/02/12/simple-volatility-syntax/]]></link>
			<title>Simple Volatility Syntax</title>
			<pubDate><![CDATA[Mon, 12 Feb 2018 13:48:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/contact/]]></guid>
			<link><![CDATA[https://dfirinsights.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Mon, 12 Feb 2018 13:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dfirinsights.com/2024/11/08/instant-forensics-with-plaso-and-psort-in-docker/]]></guid>
			<link><![CDATA[https://dfirinsights.com/2024/11/08/instant-forensics-with-plaso-and-psort-in-docker/]]></link>
			<title>Instant forensics with plaso and psort in docker</title>
			<pubDate><![CDATA[Fri, 08 Nov 2024 22:21:39 +0000]]></pubDate>
		</item>
				</channel>
</rss>
