Latest Headlines
 
Read More
67
 
Read More
114
 
Read More
35

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
iOS forensics
The News
Most Recent
 
Read More
2018-02-16

Recovering Email Attachments

We get so much information In the age of digital technology, that sometimes it happens too much. Our mailboxes are so crowded that we often delete extremely important emails in turmoil.

9
 
Read More
2018-02-15

Detecting malware with yara scripts

Malware researchers like to use YARA to identify and classify samples of malicious files. You can create descriptions of malware families based on text or binary samples with YARA.

14
 
Read More
2018-02-14

Blockchain Myths

The technology of Blochkchain has been heard recently. Blockchain is a way of storing data or a digital register of transactions, transactions, contracts. In the blockroom you can store data about almost everything. Its main difference and undeniable advantage is that this registry is not stored in any one place. It is distributed among several hundreds and even thousands of computers all over the world.

9
 
Read More
2018-02-13

Building a Malware Analysis Lab

Recently, everything is developing very quickly and improving. Criminals are developing more and more complex methods of obscuring how their malware operates, which complicates the work. One great way to learn about malware is to build your own home.

27
 
Read More
2018-02-12

LaZagne Overview

AlessandroZ has shared the piece of software called ‘LaZagne’. LaZagne uses an internal Windows API called CryptUnprotectData to decrypt user passwords. It is fantastic work!

 

26
 
Read More
2018-02-11

Analyzing an attack with powershell

Nikhil Mittal has shared the presentation ‘Hacked? Pray that the Attacker used PowerShell’. It tell us how to find fingerprints of an attack with powershell in a compromised system.

35
 
Read More
2018-02-11

Bruteforcing Linux Full Disk Encryption

Users typically use simple passwords. This is what computer attackers use. They calculate the password necessary for penetrating the network by selection.

20
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Recovering Email Attachments
 
Blockchain Myths
 
Building a Malware Analysis Lab
 
Analyzing an attack with powershell
More
Articles
 
Removing Crypto-Mining Malware with SysInternals Tools
 
Apple iOS Vulnerabilities – Zero Day Attacks
 
Electronic Evidence where to find in Files
 
Machine Learning in Cybersecurity
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
How to load Cellebrite images into AXIOM
 
How to debug the third-party Android Java code
 
AI in Cybersecurity
 
Deobfuscating dex files
More
Software
 
Detecting malware with yara scripts
 
LaZagne Overview
 
Decrypting WhatsApp databases
 
FTK Imager Command Line Physical Disk Hashing
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
9
Editor's Picks
 
 
 
 
Go To
SORT
 
Removing Crypto-Mining Malware with SysInternals Tools