Cybersecurity Career Guide: How to Land the Best Jobs | from University of...
Cybersecurity Career Guide: How to Land the Best Jobs Cybercrime can’t simply hurt businesses. It can destroy them. After a ransomware attack struck a medical office in Battle Creek, Michigan in April...
View ArticleAndroid Forensics Challenge [FREE COURSE CONTENT]
In this course content blog we want to share an Android Forensics challenge - we are publishing evidence files from our Android Forensics course, along with some questions from Module 2 assignment in...
View ArticleAirDrop Forensics | by Kinga Kięczkowska
AirDrop Forensics Welcome to AirDrop forensics! Let’s start with the basics: what is AirDrop? It’s a file-sharing service in macOS and iOS which uses both Bluetooth and WiFi to transfer files from one...
View ArticleAirDrop Forensics 2 | by Kinga Kięczkowska
AirDrop Forensics 2 Welcome in AirDrop Round 2! After I published the AirDrop Forensics post my dear friend Mikey got in touch to let me know about other ways of obtaining AirDrop artefacts. Those are...
View ArticleThe Cyber Kill Chain explained – along with some 2020 examples | By Maciej...
The Cyber Kill Chain explained – along with some 2020 examples The Cyber Kill Chain framework is known to just about everybody who works hands on in the information security industry. I must admit,...
View ArticleStorage Reserve blocks some tools from thoroughly wiping unallocated space |...
Storage Reserve blocks some tools from thoroughly wiping unallocated space Storage Reserve is a relatively new feature that keeps some disk space in a system volume available for downloading and...
View ArticleThunderbird Artifacts [FREE COURSE CONTENT]
In this excerpt from our Ubuntu Forensics course we will take a closer look at Thunderbird artifacts. Thunderbird is a popular email client, and all forensic investigators should know what information...
View ArticleDebugging VisualBasic Malware | By Siddharth Sharma
Debugging VisualBasic Malware Introduction Reversing malware written in Visual Basic has always been a challenge, or nightmare, as its functionality is totally different from other malware. Malware...
View ArticleHow to Strengthen Cybersecurity During/After COVID-19 | By Luke Smith
How to Strengthen Cybersecurity During/After COVID-19 The COVID-19 pandemic has spared no sector — its effects are even being seen in the cybersecurity industry. Through the pandemic, the usage of the...
View ArticleWindows Process Internals : A few Concepts to know before jumping on Memory...
Windows Process Internals : A few Concepts to know before jumping on Memory Forensics I have been revising memory forensics lately and realized that there are very important concepts related to Windows...
View ArticleDeepfakes: Genesis [FREE COURSE CONTENT]
In this text from our Digital Visual Media Anti–Forensics and Counter Anti–Forensics online course by Raahat Devender Singh we discover how deepfakes came to be, and where they're going. Deepfakes,...
View ArticleNew phishing campaign aimed at Bank of Ireland users | By Maciej Makowski
New phishing campaign aimed at Bank of Ireland users Update: It appears that all the websites examined below have now been taken down. The urlscan links are dead too. A new phishing campaign targeting...
View ArticleAndroid Security Model, Infections and Detection Methods [FREE COURSE CONTENT]
In this short excerpt from our Android Malware Analysis course by Tom Sermpinis you can learn how the Android Security Model works, what are the common infection vectors, and their detection methods....
View ArticleBlack Energy 2 – Revisited (In-depth Memory Analysis) | By Kirtar Oza
Black Energy 2 – Revisited (In-depth Memory Analysis) Memory forensics is no different than any other investigation where “getting a first hit” is the most important thing. We may need to go through...
View ArticleThe COVID-19 Pandemic Is Already Taking a Toll on Cyber Security – This Is...
The COVID-19 Pandemic Is Already Taking a Toll on Cyber Security – This Is How CISOs Should Respond Find out How CISOS Should Prepare for the Pandemic Challenges! The coronavirus pandemic is affecting...
View ArticleExtracting Passwords from Qihoo 360 Safe Browser and Tor Browser | By Oleg...
Extracting Passwords from Qihoo 360 Safe Browser and Tor Browser Tor Browser is a well-known tool for browsing the Web while renaming anonymous, while Qihoo 360 Safe Browser is one of China’s most...
View ArticleBreaking LUKS Encryption | By Oleg Afonin
Breaking LUKS Encryption LUKS encryption is widely used in various Linux distributions to protect disks and create encrypted containers. Being a platform-independent, open-source specification, LUKS...
View ArticleWindows Process Internals: A few Concepts to know before jumping on Memory...
Windows Process Internals: A few Concepts to know before jumping on Memory Forensics [Part 2] – ldrmodules Ldrmodules is one of the trusted plugins of Volatility suit to detect a dll-hiding or...
View ArticleThe NSA’s advice on limiting location data exposure | By Maciej Makowski
The NSA’s advice on limiting location data exposure This week the US National Security Agency (NSA) published, rather ironically, a 3 page long document on the privacy risks posed by mobile devices....
View ArticleEfficacy of detecting "abnormal" is as good as your capability to detect...
Efficacy of detecting "abnormal" is as good as your capability to detect "Normal" The post Efficacy of detecting "abnormal" is as good as your capability to detect "Normal" | By Kirtar Oza appeared...
View Article