April 20, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: malware hunting (page 2)

Tag Archives: malware hunting

Tips & Tricks

Automating Large-Scale Memory Forensics

Henrik Johansen has published a post about how to automate memory forensics process as much as possible. He starts from the …

Videos

Taking Hunting to the Next Level: Hunting in Memory

The vast majority of threat hunting takes place on easily visible and accessible system artifacts. These include log entries…

Videos

Investigating Malware Using Registry Forensics

Here is Jason Hale’s talk from Louisville Infosec 2017 titled “Investigating Malware Using Registry Forensi…

News

FLARE-On Challenge is Coming Very Soon

The fourth challenge by the FireEye Labs Advanced Reverse Engineering (FLARE) team will be started in 10 hours. Don’t …

Videos

Windows Memory Analysis

As a continuation of the “Introduction to Memory Forensics” video, Richard Davis will show you how to use Volatility to anal…

Tips & Tricks

Deep Analysis of New Poison Ivy Variant

Recently, the FortiGuard Labs research team observed that a new variant of Poison Ivy was being spread t…

How To

Memory Acquisition and Virtual Secure Mode

Jason Hale has published a post about the impact of VBS on memory acqusition. With Windows 10 and Server 2016, Microsoft add…

Science

Scanning Memory with Yara

Memory analysis has been successfully utilized to detect malware in many high profile cases. The use of signature scanning t…

Science

Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks

Memory forensics is now a standard component of digital forensic investigations and incident response handling, since memory…

Software

FLARE VM – a fully customizable, Windows-based security distribution for malware analysis

FLARE VM is a fully customizable, Windows-based security distribution for malware analysis, incident response, penetration t…

Page 2 of 612345 ...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account