Blog

Latest news around the world

eForensicsmag Team OfficialOpen

Interview with Israel Torres

Israel Torres is an enterprise cybersecurity professional with experience in software engineering, reverse engineering, integration & automation, information systems & technology, research & development, and technical writing. In addition, he has earned and currently maintains three GIAC certifications, GREM, GCDA, GPYC, and is also a member of the GIAC Advisory Board and is actively working on earning the GIME certification.

May 04,2023

8 min read

Email Delivery: How to Break All the Rules of Zero Trust

92% of malware spread through the email system. This is not a surprise if we consider that the email delivery system breaks almost all the rules defined in Zero Trust. Even though there are several ways to apply security policies to email transfer, these methods are not nearly as widely declared and enforced as they should be. In this article, I’ll describe how an organization should transform its email delivery to ensure it conforms to the Zero Trust model.

Apr 19,2023

9 min read

Five Methods to Customize Your e-Commerce Experience Using Artificial Intelligence

Another area where AI is making a big difference is customer service. Chatbots and virtual assistants can manage to handle gene customer inquiries and provide quick and efficient solutions to customer problems. This saves time for both the customer and the business and ensures customers have a positive experience with the company. 

Apr 18,2023

5 min read

Vulnerability Assessment: A Proactive Approach for Better SaaS Security

In today's fast-evolving threat landscape, businesses must adopt a proactive approach to security to prevent potential security breaches. Vulnerability assessment is one such proactive approach that enables businesses to identify and address security weaknesses before attackers can exploit them. In this article, we will explore vulnerability assessment and its importance, and discuss five best practices for better SaaS security.

Apr 18,2023

7 min read

kalpa4096 OfficialNew

Unleashing the Power of Artificial Intelligence in Digital Forensics: Role of Digital Forensics in Fighting Cybercrime

In an era defined by digital innovation and the ever-expanding reach of technology, the field of digital forensics plays a critical role in uncovering evidence, investigating cybercrime, and ensuring justice in the digital realm 1. Digital forensics involves the collection, analysis, and interpretation of digital evidence from various sources, such as computers, mobile devices, networks, and digital storage media. With the surge in data volumes and the complexity of digital crimes, traditional forensic methods have faced significant challenges. However, the emergence of Artificial Intelligence (AI) has brought forth a new era in digital forensics, revolutionizing the way investigations are conducted and enhancing the efficiency and accuracy of the process.

May 29,2023

10 min read

Managing Evidence and Investigations with Cellebrite Guardian

Since Guardian is hosted within AWS GovCloud, users are also offered the protection of the cloud service provider’s extensive compliance portfolio. Cellebrite Guardian is a serious contender as it is built for user simplicity and collaboration. Cellebrite has raised the bar with Guardian, and it should be considered for digital forensic laboratories of all sizes.

May 25,2023

7 min read

Israel Torres Official

Hunting for macOS Ransomware Using VirusTotal Enterprise

ARRR-Ransomware for macOS be-out there ‘laddies’, and we are going to find it! Join me as we embark on a wild adventure to sail the deepest and darkest seas on the hunt for macOS ransomware. BONUS: We’ve added a surprise for the latest ransomware for macOS, which occurred during the preliminary writing of this article.

May 05,2023

27 min read

Jeff Official

Ransomware Phishing Attacks

This is increasingly becoming the new reality as ransomware is not only easy to initiate but also can be highly profitable. Home users, small businesses, large businesses, government networks, health care, education, everyone is a target. While infection methods can vary from a malicious text message link, an infected USB drive, infected software online, bogus movie downloads, malicious websites, etc., in this article, we will be focusing on email delivery, things to lookout for, and mitigation techniques.

May 05,2023

11 min read

Dauda Sule Course

eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59)

eForensics for eWarfare: Investigations, Threat Detection, and Reconnaissance in the Electromagnetic Spectrum" is an innovative course designed to introduce learners to the application of digital forensics tools and techniques in electronic warfare. It aims to deepen participants' understanding of electronic warfare, its history, military applications, and how digital forensics is applied in warfare and intelligence. The course also focuses on the significance of electronic warfare in today's world, discussing potential threats and how to mitigate them. COURSE STRUCTURE: This course is structured into several key modules, each focusing on a specific aspect of electronic warfare. The modules are: Introduction to Electronic Warfare Notable Milestones in the Development of Electronic Warfare A Look at Air Force Radar Systems Military Application of Digital Forensics Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS) Each module ends with a multiple-choice quiz to ensure understanding, with a pass mark of 75%. EQUIPMENT & PREREQUISITES: To participate, students will need a PC, tablet, or smartphone with an internet connection. Basic knowledge of information systems, cybersecurity, and digital forensics is recommended. ABOUT THE LECTURER: This course is led by an experienced lecturer from the Cyber Security Department of the Air Force Institute of Technology (AFIT), Kaduna. With a background in both training and consulting, the lecturer has considerable expertise in a range of relevant areas, including information and physical management, security, assurance, and control. Furthermore, he has authored numerous articles in well-established journals, including eForensics Magazine and the ISACA Journal, and has led training workshops on digital forensics and eDiscovery.

May 26,2023

9 min read

The Complete Path to Passing the CHFI Certification Exam - Digital Forensics Mastery Program (W58)

We are proud to offer our comprehensive 15-module course, "Become a Certified Computer Forensics Investigator: The Complete Path to Success in Passing the CHFI Certification Exam." This course is designed to provide you with a deep understanding of the computer investigation process and prepare you to become a certified computer forensics investigator. Our course covers a wide range of topics including data acquisition, network forensics, database forensics, cloud forensics, mobile device forensics, and more. Each module is designed to give you hands-on experience with the tools and techniques used in digital forensics investigations. You will also learn how to identify and counteract anti-forensics techniques and recognize potential cyber threats. Our experienced instructors will guide you through the course material and help you prepare for the CHFI certification exam. Additionally, you will have access to our exclusive community on Discord, where you can share insights and experiences with fellow students, ask questions of our instructors, and network with other professionals in the field. After completing the course, you will have the knowledge and skills needed to succeed as a computer forensics investigator and earn the CHFI certification. Enrol today and start your journey to becoming a certified computer forensics investigator!

May 08,2023

22 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

10 min read

Cloud Forensics (W56)

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.

Aug 26,2022

19 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013