Join our Telegram DFIR group!
Guys, we have created a Telegram group, where we will do our best to answer all your questions. We will be very happy if you join it! Here is the invite link for you: https://t.me/joinchat/EIgkbEOk4TRrGPFbyarEJw
Guys, we have created a Telegram group, where we will do our best to answer all your questions. We will be very happy if you join it! Here is the invite link for you: https://t.me/joinchat/EIgkbEOk4TRrGPFbyarEJw
Matthew Dunwoody from FireEye has published a research on how Russian nation-state attackers APT29 employing domain fronting techniques for stealthy backdoor access to victim environments.
This month Apple has updated iOS Security Guide, which may be very useful both for mobile forensics practitioners and security researchers. Here is the link to the most up-to-date copy.
Researches from Google and CWI Amsterdam are announcing the first practical technique for generating a SHA-1 collision. Here is the summary of how they went about generating a collision. As a proof of the attack, they are releasing two PDFs that have identical SHA-1 hashes but different content.
As you may already know, nominations for the 2017 Forensic 4Cast Awards have opened. There is a number of nominations available, but we would like to note just one – Digital Forensic Blog of the Year. No, we don’t want to ask you to nominate this blog (but, of course, you can if you want, we appreciate it), we would like …
We would like to thank everyone who was reading our blog this year, keep inspiring us and we promise to provide you with the most interesting and useful pieces of information about computer, mobile, network, memory, malware, cloud and cyber forensics. We also would like to thank everyone who supported us, and especially: Phill Moore and his This Week in …
Login