January 21, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
  • Articles

    PC3000 Portable III in Digital Forensics

    Introduction Sooner or later, most forensics experts have to deal with damaged hard drives…

  • Articles

    How to analyze different types of devices and find connections between them

    Modern digital forensics and incident response cases may involve quite different types of …

  • Articles

    Threat Hunting: What it Is, and What it Is Not

    Nowadays everybody is talking about threat hunting. Everyone wants to be a threat hunter. …

  • Current
  • Slide 4
  • Slide 5
  • Slide 6

Cyber Forensics Blog

Articles

Utilities go for launch!

Smartphones and tablets are widely used in everyday life and in various technological processes. For this reason, they often…

Articles

Checkm8 review translation

The checkm8 exploit for iOS devices emerged in September 2019. It opened new doors for digital forensics researchers and inv…

Articles

Looking at Microsoft Teams from a DFIR Perspective

David Cowen’s Sunday Funday is back, so why not to take part in this fun? Last Sunday’s challenge was to look at…

Articles

Forensic Walkthrough: QBot Infection

For some reason, there are not so many posts on forensic examination of hosts infected with different malware families. We d…

Show More News

Tags

android forensics APFS forensics Autopsy Belkasoft blue team cloud forensics computer forensics computer forensics software cyber crime cyber forensics DFIR digital forensics digital forensics software digital investigations event logs forensics forensic imaging forensic tools incident response ios forensics IoT forensics IR linux forensics macOS forensics Mac OS X forensics Magnet Forensics malware analysis malware forensics malware hunting memory forensics memory forensics software mobile forensics network forensics OS X forensics PowerShell forensics registry forensics Richard Davis SANS The Sleuth Kit threat hunting usb forensics Volatility web browser forensics Windows 10 forensics windows forensics windows mobile forensics

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

  • May 24, 2020

    Utilities go for launch!

  • May 6, 2020

    Checkm8 review translation

CyberForensicator.com © Copyright 2016-2020, All Rights Reserved

Login

Welcome!Log into your account