We’ve baked cookies.
Want to have some with us

Mmm, they smell great! We've baked cookies on our website, and we'd love for you tohave some with us. We use them not only to keep our website working properly, butalso to anonymously analyse data on where you munch on our site. So, would you like some?

Want to know the ingredients? Check out our recipe.
You want to know the ingredients? Check out our recipe.

Incident Response and Forensic Analysis

A forensic analysis should be performed if you suspect your security has been compromised.

How Do We Proceed?

  • We analyze the artifacts in the working system
  • We re-acquire deleted files
  • We extract malicious software from memory banks, which means we can also uncover sophisticated attempts to conceal it from typical forensic tools
  • The result of the analysis is a detailed report summarizing the attack’s activities in the applications or systems on the basis of the evidence collected. The acquired information will then allow you to implement the appropriate countermeasures.