Digital Forensics: Phases and ImportanceDigital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it... BLOG 2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues... Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Digital Forensics: Phases and ImportanceDigital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...
BLOG 2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues... Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues...
Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would...
Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It...
Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities....
What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests....
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another...
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...