
File | |
---|---|
eForensics Magazine 2019 07 Cyber Threat Hunting PREVIEW UPDATED.pdf |
Dear Readers,
We decided to dedicate this month’s edition to the topic of threat hunting - a cyber defence activity, that has strong connections to digital forensics. We believe that it might be in the area of interest for most of you.
In “Cyber Threat Hunting” issue you can read about threat hunting malicious command & control, end-point threat hunting and windows event log threat hunting.
In addition to that we want to offer you a forensic analysis of screen time on macOS and iOS, a comparison between Internal Hi-Tech Crime Units and Private Forensic Laboratories, an interview with Alexandre Borges about his tool - malwoverview, an article “Reverse engineering as a Digital Forensic skillset”, and that’s still not all!
Thanks to all authors, reviewers and proofreaders for participating in this project.
Happy hunting!
Dominika Zdrodowska
and the eForensics Team
INSIDE OF THE PREVIEW: Full article by Sam Bocetta "Which IoT Devices Are The Most Targeted by Hackers?”
Subscriber? Click here to download the whole issue
File | |
---|---|
eForensics Magazine 2019 07 Cyber Threat Hunting PREVIEW UPDATED.pdf |