April 19, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: SANS (page 3)

Tag Archives: SANS

Webinars

Elevating Your Analysis Tactics with the DFIR Network Forensics Poster

FOR572: Advanced Network Forensics Analysis course author and instructor Phil Hagen introduces the SANS DFIR Network Forensi…

Videos

WannaCry Ransomware Threat: What We Know So Far

The WannaCry ransomware worm is unprecedented for two reasons. First, it’s a ransomware worm. Second, it appears to be…

Webinars

A Guide to Eric Zimmerman’s command line tools

SANS Instructor and Former FBI Agent Eric Zimmerman has provided several open source command line tools free to the DFIR Com…

Videos

Cyber Threat Intelligence Summit 2017

SANS has published 16 videos from Cyber Threat Intelligence Summit 2017. All videos are available for free at SANS Digi…

Webinars

Cliff Stoll – (Still) Stalking the Wily Hacker

Three Decades of Computer Security in Perspective Before anyone thought to utter the words “cyber threat intelligence,” Clif…

Page 3 of 3123

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account