Search Results for: digital investigation Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts.... Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Knowledge Center 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic... Page Remote Cyber Security Solutions Suite April 15, 2020 Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Blog Post A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It...
Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the...
Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests....
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts....
Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Knowledge Center 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic...
Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Blog Post A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...