Guide to Hardening Windows 10Introduction Windows 10 is the most widely used desktop operating system in enterprise environment. It features extensive security policies, allowing... KNOWLEDGE CENTER System Resource Usage Monitor (SRUM) Technical Guide Windows Time Machine SRUM – Another Windows Time Machine September 9, 2020 Overview In standard forensics investigations, sooner or later arises the need to find and extract evidence of program execution on... Investigating Process Objects and Network Activity Technical Guide Windows Memory Forensics Windows Memory Forensics Technical Guide Part 3 July 15, 2020 Investigating Process Objects and Network Activity. Generally speaking, an object is a data structure that represents a system resource, such... Introduction to Structured Analysis with Volatility Technical Guide Windows Memory Forensics Windows Memory Forensics Part 2 Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction... Introduction to Memory Forensics Unstructured Analysis Memory Acquisition Technical Guide Windows Memory Forensics Windows Memory Forensics Technical Guide Part 1 June 5, 2020 Introduction to Memory Forensics Unstructured Analysis. Overview Memory forensics has been a crucial part of an investigation process for some... Mining parameters from dark corners of Web Archives ParamSpider Technical Guide ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling... 923 words on Windows Ntuser.dat Computer Forensics digital forensic investigation LIFARS Tech Diary Technical Guide What is the NTUSER.DAT File in Windows 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic... Cybersecurity Essentials Guide For Law Enforcement Cybersecurity Recommendations for Law Enforcement LIFARS Cybersecurity Essentials Technical Guide LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should... hardening steps to make Windows 10 secure. how to secure Windows 10 Technical Guide windows 10 hardening Windows 10 security Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools... Case Study Controlled folder access Defend against Ransomware evil corp Ransomware Attack Recovery Services Technical Guide Defend against Ransomware: Controlled Folder Access January 25, 2020 Ransomware has been a significant and serious threat to organizations. A successful attack not only causes a monetary loss but... BitPaymer and DoppelPaymer campaign BitPaymer Ransomware Case Study Cyber Vaccines Dridex CyberVaccine evil corp LIFARS Tech Diary Malware Analysis of Dridex Ransomware fix Technical Guide Technical Tools what is cyber vaccine Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Technical Guide Zero-Day Exploits May 8, 2018 Having vulnerabilities is inevitable in cyberspace. The issues at hand, is that many companies are not aware of their vulnerabilities... Contact LIFARS.com if you have been hacked Data Breach Litigation Expert How to Protect Yourself from Identity Theft LIFARS Data Breach Response Technical Guide Data Breach Response Plan March 29, 2018 When a data breach occurs, an organization will not have time to prepare for a response or assemble a... evil corp Technical Guide How to Combat Ransomware February 15, 2018 Ransomware has become one of the top trends within the cybersecurity domain. The tools and techniques used in ransomware attacks... Cyber Incident Response cyber security company Technical Guide Role of Incident Response in Cyber Climate of 2018 December 26, 2017 Malware continues to evolve becoming more sophisticated with the variety of attacks that ultimately have a crucial impact on an individual... Technical Guide Bad Rabbit Ransomware Guide December 7, 2017 Bad Rabbit is a recent ransomware campaign that has focused their attacks on multiple companies and government agencies across Russia...
Guide to Hardening Windows 10Introduction Windows 10 is the most widely used desktop operating system in enterprise environment. It features extensive security policies, allowing...
KNOWLEDGE CENTER System Resource Usage Monitor (SRUM) Technical Guide Windows Time Machine SRUM – Another Windows Time Machine September 9, 2020 Overview In standard forensics investigations, sooner or later arises the need to find and extract evidence of program execution on... Investigating Process Objects and Network Activity Technical Guide Windows Memory Forensics Windows Memory Forensics Technical Guide Part 3 July 15, 2020 Investigating Process Objects and Network Activity. Generally speaking, an object is a data structure that represents a system resource, such... Introduction to Structured Analysis with Volatility Technical Guide Windows Memory Forensics Windows Memory Forensics Part 2 Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction... Introduction to Memory Forensics Unstructured Analysis Memory Acquisition Technical Guide Windows Memory Forensics Windows Memory Forensics Technical Guide Part 1 June 5, 2020 Introduction to Memory Forensics Unstructured Analysis. Overview Memory forensics has been a crucial part of an investigation process for some... Mining parameters from dark corners of Web Archives ParamSpider Technical Guide ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling... 923 words on Windows Ntuser.dat Computer Forensics digital forensic investigation LIFARS Tech Diary Technical Guide What is the NTUSER.DAT File in Windows 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic... Cybersecurity Essentials Guide For Law Enforcement Cybersecurity Recommendations for Law Enforcement LIFARS Cybersecurity Essentials Technical Guide LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should... hardening steps to make Windows 10 secure. how to secure Windows 10 Technical Guide windows 10 hardening Windows 10 security Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools... Case Study Controlled folder access Defend against Ransomware evil corp Ransomware Attack Recovery Services Technical Guide Defend against Ransomware: Controlled Folder Access January 25, 2020 Ransomware has been a significant and serious threat to organizations. A successful attack not only causes a monetary loss but... BitPaymer and DoppelPaymer campaign BitPaymer Ransomware Case Study Cyber Vaccines Dridex CyberVaccine evil corp LIFARS Tech Diary Malware Analysis of Dridex Ransomware fix Technical Guide Technical Tools what is cyber vaccine Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Technical Guide Zero-Day Exploits May 8, 2018 Having vulnerabilities is inevitable in cyberspace. The issues at hand, is that many companies are not aware of their vulnerabilities... Contact LIFARS.com if you have been hacked Data Breach Litigation Expert How to Protect Yourself from Identity Theft LIFARS Data Breach Response Technical Guide Data Breach Response Plan March 29, 2018 When a data breach occurs, an organization will not have time to prepare for a response or assemble a... evil corp Technical Guide How to Combat Ransomware February 15, 2018 Ransomware has become one of the top trends within the cybersecurity domain. The tools and techniques used in ransomware attacks... Cyber Incident Response cyber security company Technical Guide Role of Incident Response in Cyber Climate of 2018 December 26, 2017 Malware continues to evolve becoming more sophisticated with the variety of attacks that ultimately have a crucial impact on an individual... Technical Guide Bad Rabbit Ransomware Guide December 7, 2017 Bad Rabbit is a recent ransomware campaign that has focused their attacks on multiple companies and government agencies across Russia...
System Resource Usage Monitor (SRUM) Technical Guide Windows Time Machine SRUM – Another Windows Time Machine September 9, 2020 Overview In standard forensics investigations, sooner or later arises the need to find and extract evidence of program execution on...
Investigating Process Objects and Network Activity Technical Guide Windows Memory Forensics Windows Memory Forensics Technical Guide Part 3 July 15, 2020 Investigating Process Objects and Network Activity. Generally speaking, an object is a data structure that represents a system resource, such...
Introduction to Structured Analysis with Volatility Technical Guide Windows Memory Forensics Windows Memory Forensics Part 2 Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction...
Introduction to Memory Forensics Unstructured Analysis Memory Acquisition Technical Guide Windows Memory Forensics Windows Memory Forensics Technical Guide Part 1 June 5, 2020 Introduction to Memory Forensics Unstructured Analysis. Overview Memory forensics has been a crucial part of an investigation process for some...
Mining parameters from dark corners of Web Archives ParamSpider Technical Guide ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling...
923 words on Windows Ntuser.dat Computer Forensics digital forensic investigation LIFARS Tech Diary Technical Guide What is the NTUSER.DAT File in Windows 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic...
Cybersecurity Essentials Guide For Law Enforcement Cybersecurity Recommendations for Law Enforcement LIFARS Cybersecurity Essentials Technical Guide LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should...
hardening steps to make Windows 10 secure. how to secure Windows 10 Technical Guide windows 10 hardening Windows 10 security Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools...
Case Study Controlled folder access Defend against Ransomware evil corp Ransomware Attack Recovery Services Technical Guide Defend against Ransomware: Controlled Folder Access January 25, 2020 Ransomware has been a significant and serious threat to organizations. A successful attack not only causes a monetary loss but...
BitPaymer and DoppelPaymer campaign BitPaymer Ransomware Case Study Cyber Vaccines Dridex CyberVaccine evil corp LIFARS Tech Diary Malware Analysis of Dridex Ransomware fix Technical Guide Technical Tools what is cyber vaccine Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)...
Technical Guide Zero-Day Exploits May 8, 2018 Having vulnerabilities is inevitable in cyberspace. The issues at hand, is that many companies are not aware of their vulnerabilities...
Contact LIFARS.com if you have been hacked Data Breach Litigation Expert How to Protect Yourself from Identity Theft LIFARS Data Breach Response Technical Guide Data Breach Response Plan March 29, 2018 When a data breach occurs, an organization will not have time to prepare for a response or assemble a...
evil corp Technical Guide How to Combat Ransomware February 15, 2018 Ransomware has become one of the top trends within the cybersecurity domain. The tools and techniques used in ransomware attacks...
Cyber Incident Response cyber security company Technical Guide Role of Incident Response in Cyber Climate of 2018 December 26, 2017 Malware continues to evolve becoming more sophisticated with the variety of attacks that ultimately have a crucial impact on an individual...
Technical Guide Bad Rabbit Ransomware Guide December 7, 2017 Bad Rabbit is a recent ransomware campaign that has focused their attacks on multiple companies and government agencies across Russia...