Spotting the Signs of Lateral Movement
Derek King has published another post as part of his “Hunting with Splunk: The Basics” series. This time he…
Derek King has published another post as part of his “Hunting with Splunk: The Basics” series. This time he…
Most people know the Shadow Brokers leaked (supposedly) stolen NSA cyber tools, which lead to some of the most significant c…
DFRWS presented a new challenge – this year they continue to motivate forensicators to research and develop in the fie…
Magnet Forensics announced a new expert-level four-day training course. It is designed to give you the knowledge a…
As a continuation of the “Introduction to Windows Forensics” series, this episode looks at CyberChef, a powerful…
Python is uniquely positioned as a programming language to perform cyber investigations and perform forensics analysis. Unle…
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this…
This video will show you how to decrypt encrypted notes (password protected) on iOS devices and enter the password into Cell…
0.2-alpha version of memtriage has been released. This tool allows you to quickly query a Windows machine for RAM artifacts.…
A new book by Arthur Salmon has been announced by Packt Publishing. The book is titled “Hands-On Network Forensics: In…
Login