March 05, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
  • Articles

    Find out what happened during a ransomware attack on computer

    Introduction The encryption pandemic has swept the world. No commercial companies or gover…

  • Articles

    Analyzing videos with multiple video streams in digital forensics

    In this article, we will review a special case of video files: files with multiple video s…

  • Articles

    PC3000 Portable III in Digital Forensics

    Introduction Sooner or later, most forensics experts have to deal with damaged hard drives…

  • Current
  • Slide 4
  • Slide 5
  • Slide 6

Cyber Forensics Blog

Articles

How to analyze different types of devices and find connections between them

Modern digital forensics and incident response cases may involve quite different types of devices. The variety of electronic…

Articles

Threat Hunting: What it Is, and What it Is Not

Nowadays everybody is talking about threat hunting. Everyone wants to be a threat hunter. Every employer wants to hire a thr…

Articles

Utilities go for launch!

Smartphones and tablets are widely used in everyday life and in various technological processes. For this reason, they often…

Articles

Checkm8 review translation

The checkm8 exploit for iOS devices emerged in September 2019. It opened new doors for digital forensics researchers and inv…

Show More News

Tags

android forensics APFS forensics Autopsy Belkasoft blue team cloud forensics computer forensics computer forensics software cyber crime cyber forensics DFIR digital forensics digital forensics software digital investigations event logs forensics forensic imaging forensic tools incident response ios forensics IoT forensics IR linux forensics macOS forensics Mac OS X forensics Magnet Forensics malware analysis malware forensics malware hunting memory forensics memory forensics software mobile forensics network forensics OS X forensics PowerShell forensics registry forensics Richard Davis SANS The Sleuth Kit threat hunting usb forensics Volatility web browser forensics Windows 10 forensics windows forensics windows mobile forensics

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • 19 hours ago

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account