Blog

Latest news around the world

16

Apr'19

What files were recently accessed? | By Justin Boncaldo

What files were recently accessed? Digital forensic investigators are typically hired to uncover what happened on a digital device. Regardless of …

Read More

16

Apr'19

Development of DNS security, attacks and countermeasures | By Karl Andersson & David Montag

Development of DNS security, attacks and countermeasures Abstract We use the Internet every day. The Internet relies in its very …

Read More

15

Apr'19

What Can EnCase Identify That Other Digital Forensics Tools Can't? | From DCG Technical Solutions, Inc.

What Can EnCase Identify That Other Digital Forensics Tools Can't? If you are a digital forensics specialist or enthusiast, you …

Read More

09

Apr'19

Instagram Forensics -Windows App Store | By Justin Boncaldo

Instagram Forensics -Windows App Store Instagram is a very popular social media application that allows its users to interact through …

Read More

09

Apr'19

Global DNS Hijacking Campaign: DNS Record Manipulation at Scale | By Muks Hirani, Sarah Jones, Ben Read

Global DNS Hijacking Campaign: DNS Record Manipulation at Scale Introduction FireEye’s Mandiant Incident Response and Intelligence teams have identified a …

Read More

01

Apr'19

Cuckoo Sandbox Architecture | by Ricardo van Zutphen

Cuckoo Sandbox Architecture Introduction Cuckoo Sandbox (GitHub) is a widely used advanced automated malware analysis tool. It consists of multiple, modular …

Read More

01

Apr'19

How Safe Is Our Online Data? | From TechJury

How Safe Is Our Online Data? Safety online is becoming a greater concern by the day. As technology assumes a …

Read More

14

Mar'19

Malware Analysis Frameworks | By Prasanna B Mundas

Malware Analysis Frameworks As I have mentioned in an earlier post, there are many frameworks required to analyze malware behavior in …

Read More

14

Mar'19

DYNAMIC MALWARE ANALYSIS – PROCESS MONITOR AND EXPLORER | By Prasanna B Mundas

DYNAMIC MALWARE ANALYSIS – PROCESS MONITOR AND EXPLORER Now, by the previous posts, we know that what are the artifacts …

Read More

07

Mar'19

Is Your Backup a Real Backup? Part II: Combating Ransomware with Traditional Backups | By Jason Thomas

Is Your Backup a Real Backup? Part II: Combating Ransomware with Traditional Backups Ransomware is quickly becoming a major issue …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013