Interview with Israel Torres
Israel Torres is an enterprise cybersecurity professional with experience in software engineering, reverse engineering, integration & automation, information systems & technology, research & development, and technical writing. In addition, he has earned and currently maintains three GIAC certifications, GREM, GCDA, GPYC, and is also a member of the GIAC Advisory Board and is actively working on earning the GIME certification.
Interview with Paulo Henrique Pereira
Paulo Henrique Pereira is a CyberSec Professional and Digits3c Founder working on malware analysis. Digits3c is his small intel company …
How Technological Advancements in Forensic Technologies are Shaping Future of Crime Investigations
Increase in the incidences of crime across the globe has posed concerns across the globe. In the statistics presented by …
Forensic Science Challenges: Cloud Architecture | Cloud Forensics [FREE COURSE CONTENT]
In this video tutorial, you will go through the topic of Cloud architecture. It is a part of our online …
HOW TO INVESTIGATE FILES WITH FTK IMAGER
by Mark Stam The Master File Table or MFT can be considered one of the most important files in …
8 min read
Finding Advanced Malware Using Volatility
FINDING ADVANCED MALWARE USING VOLATILITY by Monnappa Ka What you should know Basic understanding of malware Knowledge of operating system …
8 min read
Windows Registry extraction with FTK Imager [FREE COURSE CONTENT]
There are several ways to perform an extraction from the Windows Registry, let’s see some of the most useful. This …
Installing Autopsy 4.6.0 on linux | by Christian Kisutsa
Installing Autopsy 4.6.0 on linux by Christian Kisutsa Autopsy is a digital forensics tool that needs no introduction. It has …
8 min read
Forensic Investigation of Storage Media
Tools and Procedures for Forensic Investigation of Storage Media Deivison Franco, Cleber Soares, Daniel Müller, and Joas Santos Digital data and …
Introduction to Mobile Forensics
Lesson one Tutorial 1. Introduction to Mobile Forensics of the online course "Advanced Smartphone Forensics" Check here >> Mobile Forensics …
8 min read
File System Analysis with Binwalk | By Alex Ocheme Ogbole
File System Analysis with Binwalk Binwalk is a simple Linux tool used for analysis of binary image files. Analyzing binary image …
8 min read
Unleashing the Power of Artificial Intelligence in Digital Forensics: Role of Digital Forensics in Fighting Cybercrime
In an era defined by digital innovation and the ever-expanding reach of technology, the field of digital forensics plays a critical role in uncovering evidence, investigating cybercrime, and ensuring justice in the digital realm 1. Digital forensics involves the collection, analysis, and interpretation of digital evidence from various sources, such as computers, mobile devices, networks, and digital storage media. With the surge in data volumes and the complexity of digital crimes, traditional forensic methods have faced significant challenges. However, the emergence of Artificial Intelligence (AI) has brought forth a new era in digital forensics, revolutionizing the way investigations are conducted and enhancing the efficiency and accuracy of the process.
Managing Evidence and Investigations with Cellebrite Guardian
Since Guardian is hosted within AWS GovCloud, users are also offered the protection of the cloud service provider’s extensive compliance portfolio. Cellebrite Guardian is a serious contender as it is built for user simplicity and collaboration. Cellebrite has raised the bar with Guardian, and it should be considered for digital forensic laboratories of all sizes.
Hunting for macOS Ransomware Using VirusTotal Enterprise
ARRR-Ransomware for macOS be-out there ‘laddies’, and we are going to find it! Join me as we embark on a wild adventure to sail the deepest and darkest seas on the hunt for macOS ransomware. BONUS: We’ve added a surprise for the latest ransomware for macOS, which occurred during the preliminary writing of this article.
27 min read
Ransomware Phishing Attacks
This is increasingly becoming the new reality as ransomware is not only easy to initiate but also can be highly profitable. Home users, small businesses, large businesses, government networks, health care, education, everyone is a target. While infection methods can vary from a malicious text message link, an infected USB drive, infected software online, bogus movie downloads, malicious websites, etc., in this article, we will be focusing on email delivery, things to lookout for, and mitigation techniques.
11 min read
eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59)
eForensics for eWarfare: Investigations, Threat Detection, and Reconnaissance in the Electromagnetic Spectrum" is an innovative course designed to introduce learners to the application of digital forensics tools and techniques in electronic warfare. It aims to deepen participants' understanding of electronic warfare, its history, military applications, and how digital forensics is applied in warfare and intelligence. The course also focuses on the significance of electronic warfare in today's world, discussing potential threats and how to mitigate them. COURSE STRUCTURE: This course is structured into several key modules, each focusing on a specific aspect of electronic warfare. The modules are: Introduction to Electronic Warfare Notable Milestones in the Development of Electronic Warfare A Look at Air Force Radar Systems Military Application of Digital Forensics Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS) Each module ends with a multiple-choice quiz to ensure understanding, with a pass mark of 75%. EQUIPMENT & PREREQUISITES: To participate, students will need a PC, tablet, or smartphone with an internet connection. Basic knowledge of information systems, cybersecurity, and digital forensics is recommended. ABOUT THE LECTURER: This course is led by an experienced lecturer from the Cyber Security Department of the Air Force Institute of Technology (AFIT), Kaduna. With a background in both training and consulting, the lecturer has considerable expertise in a range of relevant areas, including information and physical management, security, assurance, and control. Furthermore, he has authored numerous articles in well-established journals, including eForensics Magazine and the ISACA Journal, and has led training workshops on digital forensics and eDiscovery.
The Complete Path to Passing the CHFI Certification Exam - Digital Forensics Mastery Program (W58)
We are proud to offer our comprehensive 15-module course, "Become a Certified Computer Forensics Investigator: The Complete Path to Success in Passing the CHFI Certification Exam." This course is designed to provide you with a deep understanding of the computer investigation process and prepare you to become a certified computer forensics investigator. Our course covers a wide range of topics including data acquisition, network forensics, database forensics, cloud forensics, mobile device forensics, and more. Each module is designed to give you hands-on experience with the tools and techniques used in digital forensics investigations. You will also learn how to identify and counteract anti-forensics techniques and recognize potential cyber threats. Our experienced instructors will guide you through the course material and help you prepare for the CHFI certification exam. Additionally, you will have access to our exclusive community on Discord, where you can share insights and experiences with fellow students, ask questions of our instructors, and network with other professionals in the field. After completing the course, you will have the knowledge and skills needed to succeed as a computer forensics investigator and earn the CHFI certification. Enrol today and start your journey to becoming a certified computer forensics investigator!
Browser Forensics (W57)
The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.
Cloud Forensics (W56)
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.