Investigating Data Hiding and Covert Communication
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding…
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding…
Mike Cary has written a PowerShell script that automates the use of Eric Zimmerman’s cmd line tools (https://eric…
Maxim Suhanov has started a DFIR blog, and already submitted the first post – “A Live Forensic Distribution Exec…
Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix’s Security Intelligence and Respon…
After yesterday’s webcast Matt Bromiley released his Office365 Log Analysis Framework or OLAF to the public. You …
This presentation will share some of the techniques and lessons learned in real-world Hadoop implementation at Johns Hopkins…
Over its last few releases, Apple’s iOS—the operating system running on iPhones, iPads, and other mobile devices—has steadil…
This is a quick look at the recently revealed “activities” API within Office 365. This undocumented interface pr…
So, we decided to finish our write-up today. The forth part – the most interesting part. Intrusion! Again, no more AXI…
We are continuing our write-up. The second part will walk you through the solution of the second set of CTF problems –…
Login