Quantcast
Channel: Blog – eForensics
Browsing all 378 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How Deepfake Works

Deepfake is a technique that involves using deep learning algorithms to create realistic video or audio content that appears to show someone saying or doing something they never actually did. Creating...

View Article


Image may be NSFW.
Clik here to view.

Bitcoin Account Hijacking Using OSINT Techniques

Researchers at Kudelski Security have managed to break Bitcoin and Ethereum wallets using a novel attack against one of the most popular asymmetric key algorithms of modern cryptography. Although...

View Article


Image may be NSFW.
Clik here to view.

8 API Security Best Practices to Protect Sensitive Data

The digitization of business and the progression has raised mounting concerns regarding safeguarding private data. Application Programming Interfaces (APIs) have become vital in contemporary software...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Assessment: A Proactive Approach for Better SaaS Security

As more businesses turn to Software as a Service (SaaS) to manage their operations, the need for better SaaS security has become increasingly critical. With sensitive data stored in the cloud, any...

View Article

Image may be NSFW.
Clik here to view.

Five Methods to Customize Your e-Commerce Experience Using Artificial...

We are increasingly relying on artificial intelligence in every aspect of our lives. Artificial intelligence is everywhere, from self-checkout cash registers to advanced airport security screenings....

View Article


Image may be NSFW.
Clik here to view.

Email Delivery: How to Break All the Rules of Zero Trust

92% of malware spread through the email system. This is not a surprise if we consider that the email delivery system breaks almost all the rules defined in Zero Trust. Even though there are several...

View Article

Image may be NSFW.
Clik here to view.

Interview with Israel Torres

Israel Torres is an enterprise cybersecurity professional with experience in software engineering, reverse engineering, integration & automation, information systems & technology, research...

View Article

Image may be NSFW.
Clik here to view.

Exploring the World of Digital Forensics in 2023

Introduction Digital forensics refers to the process of uncovering, analyzing, and preserving electronic evidence to support investigations and legal proceedings. Digital forensics is the application...

View Article


Image may be NSFW.
Clik here to view.

Digital Forensics in Docker Environments: Challenges and Solutions

Digital forensics plays a critical role in investigating and analyzing cyber incidents. As Docker continues to gain popularity as a containerization technology, it brings forth unique challenges for...

View Article


Image may be NSFW.
Clik here to view.

Implementing GRC Best Practices for Enhanced Governance and Risk Management

In today's rapidly evolving business landscape, organizations face numerous challenges related to governance, risk management, and compliance (GRC). Failure to effectively address these challenges can...

View Article

Image may be NSFW.
Clik here to view.

CyberPipe

An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations. Functions: 🐏 Capture a memory image with DumpIt for Windows, 💻 Capture a triage image with KAPE, 🔐 Check...

View Article

Image may be NSFW.
Clik here to view.

Collection of Open Source Intelligence Tools (OSINT)

This article was first published on https://en.iguru.gr/syllogi-ergaleion-open-source-intelligence-osint/ The Author : Δημητρης Γεραλης Below is a free collection of active resources for those...

View Article

Image may be NSFW.
Clik here to view.

What is Social Engineering in Digital World?

In today's digitally interconnected world, where personal information is readily available online, the threat of social engineering looms large. Social engineering is an insidious form of attack that...

View Article


Image may be NSFW.
Clik here to view.

Open-source Intelligence (OSINT) Tools

Discover a compilation of remarkable open-source intelligence tools and resources with the Open-Source Intelligence (OSINT) list. These tools are gathered from publicly accessible sources, as the...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Resilience at Sea: A Look into Docker Forensics for Maritime Ports

Image Source Docker containers are becoming commonplace in the development and deployment of contemporary applications. Forensics and security for docker containers are essential for safeguarding the...

View Article


Image may be NSFW.
Clik here to view.

Understanding AI-Powered Cybersecurity

As technology advances, so do the tactics of cybercriminals. This article discusses the role of Artificial Intelligence (AI) in cybersecurity, exploring how it has become a reformer in safeguarding...

View Article

Image may be NSFW.
Clik here to view.

Mastering Machine Learning: From Basics to Advanced Algorithms

Source: https://pixabay.com//?utm_source=link-attribution&utm_medium=referral&utm_campaign=image&utm_content=2729781 Machine learning is a transformative field of Artificial Intelligence...

View Article


Image may be NSFW.
Clik here to view.

Installing Autopsy 4.6.0 on linux | by Christian Kisutsa

Installing Autopsy 4.6.0 on linux by Christian Kisutsa Autopsy is a digital forensics tool that needs no introduction. It has a ton of capabilities such as registry analysis, email analysis, media...

View Article
Browsing all 378 articles
Browse latest View live