News
Most Recent
 
Read More
2017-06-28

Malware Analysis with Viper

Today I propose to get acquainted with LockBoxx’ post. He decided to share a collection of open-source, automated static and dynamic binary analysis tools that he covers. These tools include a myriad of static analysis, dynamic analysis, and reporting tools, which we will cover in-depth in the following article. His goal is for a useful set of internal tools and a great learning experience in both reverse engineering and building a micro-service architecture for automated analysis.

 
Read More
2017-06-25

How to make your employees care about cybersecurity

“If we look at security breaches over the last five to seven years, it’s pretty clear that people, whether it’s through accidental or intentional introduction of malware, represent the single most important point of failure in terms of security vulnerabilities,” said Eddie Schwartz, chair of ISACA’s Cyber Security Advisory Council.

 

 
Read More
2017-06-24

Why Mobile Chats Are My First Source of Information for Investigations

With a Masters in Data Forensics Management, Timothy LaTulippe has assisted in complex investigations in both the public and private sectors, working with government agencies, Fortune 100 corporations and AM Law 100 firms. He wrote a post on why mobile chat rooms are my first source of information for investigations.

 

 
Read More
2017-06-23

WANNACRY ON INDUSTRIAL NETWORKS

In mid-May 2017, many companies around the world were attacked by the WannaCry network crypto variant. The Wannacle malware spread across local networks and the Internet by exploiting the CVE-2017-0143 (MS17-010) vulnerability in components of the SMBv1 service (port TCP 445) in Windows operating systems. Since the industrial network is not directly connected to the Internet, and access is provided through the corporate network using NAT, a firewall and a corporate proxy server, which makes it impossible to infect such systems via the Internet. There are typical industrial network configuration errors, which have led to WannaCry infections, according to our data:

 

Latest Headlines
 
Read More
 
Read More
 
Read More
26

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
digital forensics software
DFIR
Android forensics
iOS forensics
iphone forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Chip-off Technique in Mobile Forensics
 
2
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
3
Extracting data from a damaged iPhone via chip-off technique
 
4
Free Course: Investigating Cybersecurity Incidents
 
5
Extracting data from a damaged iPhone via chip-off technique – Part 2