Most Recent
Read More

Tools For Unpacking Malware

Today we will talk about the different ways that we use to unpack malware, and the author will share some of the tools and scripts that he often uses for this purpose. The way the order is determined largely depends on the analysis of the malware family. Sometimes it takes a lot of patience and imagination. But sometimes we can find the general behavior of malicious software, which can help us automate the task of unpacking malicious programs.

Read More

NIST drops ‘federal’ from cyber controls guidance

Employees FedScoop published an article on the abolition of “federal” from the management of cybersecurity. The National Institute of Standards and Technology excluded the formulation specific to federal legislation from its important publication on cybersecurity and confidentiality. This is one of a number of proposed changes rolled out this week after a long delay.

Read More

iCloud Acquisition Overview

Today, so much everything is permeated with the Internet and most are stored in the cloud. Vladimir Catal tells the story of Apple iCloud, its most famous hacks and about his own forensic efforts. He chronicles the development of iCloud and iOS Forensics.


Read More

Ransomware Which Hides Inside JPG Files

Lawrence Abrams talks about a new discovery, which is called SyncCrypt, the security researcher Emsisoft xXToffeeXx, which is distributed using spam attachments containing WSF files. Lawrence analyzed the script, and noted that the method used to download and install Ransomware is quite interesting. This is because the WSF script will download images with embedded ZIP files that contain the necessary files to infect the computer with SyncCrypt. This method has also made the images undetectable by almost all antivirus vendors on VirusTotal.


Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
mobile forensics
computer forensics
Android forensics
digital forensics software
iOS forensics
forensic data recovery
Top Stories
Right Now
bstrings 1.0 released
Top Five
Heat Index
Decrypting encrypted WhatsApp databases without the key
Chip-off Technique in Mobile Forensics
Extracting WhatsApp database and the cipher key from a non-rooted Android device
Extracting data from a damaged iPhone via chip-off technique
Free Course: Investigating Cybersecurity Incidents