PREVIEW: Cyber Threat Hunting

Download
File
eForensics Magazine 2019 07 Cyber Threat Hunting PREVIEW UPDATED.pdf

Dear Readers,

We decided to dedicate this month’s edition to the topic of threat hunting -  a cyber defence activity, that has strong connections to digital forensics. We believe that it might be in the area of interest for most of you.

In “Cyber Threat Hunting” issue you can read about threat hunting malicious command & control, end-point threat hunting and windows event log threat hunting. 

In addition to that we want to offer you a forensic analysis of screen time on macOS and iOS, a comparison between Internal Hi-Tech Crime Units and Private Forensic Laboratories, an interview with Alexandre Borges about his tool - malwoverview, an article “Reverse engineering as a Digital Forensic skillset”, and that’s still not all!

Thanks to all authors, reviewers and proofreaders for participating in this project.

Happy hunting!

Dominika Zdrodowska

and the eForensics Team


INSIDE OF THE PREVIEW: Full article by Sam Bocetta "Which IoT Devices Are The Most Targeted by Hackers?”


Subscriber? Click here to download the whole issue

Buy this issue



Download
File
eForensics Magazine 2019 07 Cyber Threat Hunting PREVIEW UPDATED.pdf

July 31, 2019

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013