December 10, 2019

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
  • Articles

    50 Shades of Ransomware

    Ransomware is still one of the most common types of malware deployed during cyberattacks. …

  • Articles

    Tools up: the best software and hardware tools for computer forensics

    Igor Mikhailov is a digital forensic analyst of the digital forensic laboratory at Group-I…

  • Articles

    Following the RTM

    Researchers became aware of the activities of the RTM group in December 2015. Since then, …

  • Current
  • Slide 4
  • Slide 5
  • Slide 6

Cyber Forensics Blog

Articles

Using MITRE ATT&CK for Forensics: Image File Execution Options Injection (T1183)

As was promised, we continue our Using MITRE ATT&CK for Forensics series. This time we are going to discuss another pers…

Articles

Using MITRE ATT&CK for Forensics: WMI Event Subscription (T1084)

First of all, I would like to thank all of those who liked and retweeted the previous article from this series, BITS Jobs (T…

News

The PoSh Hunter CTF

If you want to test your PowerShell skills and interested in threat hunting – the PoSh Hunter CTF is for you. …

Presentations

Launching APOLLO: Creating a Simple Tool for Advanced Forensic Analysis

Last week Sarah Edwards attended MacDevOpsYVR in Vancouver, Canada, and had a talk about her simple tool for advanced forens…

Show More News

Tags

android forensics APFS forensics Autopsy blue team cloud forensics computer forensics computer forensics software cyber crime cyber forensics DFIR digital forensics digital forensics software digital investigations event logs forensics forensic imaging forensic tools incident response ios forensics IoT forensics IR linux forensics macOS forensics Mac OS X forensics Magnet Forensics malware analysis malware forensics malware hunting memory forensics memory forensics software mobile forensics network forensics office 365 forensics OS X forensics PowerShell forensics registry forensics Richard Davis SANS The Sleuth Kit threat hunting usb forensics Volatility web browser forensics Windows 10 forensics windows forensics windows mobile forensics

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Magnet User Summit CTF: Intrusion

July 1, 2018

Timeline

  • October 27, 2019

    50 Shades of Ransomware

  • October 14, 2019

    Tools up: the best software and hardware tools for computer forensics

  • October 9, 2019

    Following the RTM

  • July 21, 2019

    Using MITRE ATT&CK for Forensics: Image File Execution Options Injection (T1183)

  • July 13, 2019

    Using MITRE ATT&CK for Forensics: WMI Event Subscription (T1084)

CyberForensicator.com © Copyright 2016-2019, All Rights Reserved

Login

Welcome!Log into your account