Most Recent
Read More

Malware Analysis with Viper

Today I propose to get acquainted with LockBoxx’ post. He decided to share a collection of open-source, automated static and dynamic binary analysis tools that he covers. These tools include a myriad of static analysis, dynamic analysis, and reporting tools, which we will cover in-depth in the following article. His goal is for a useful set of internal tools and a great learning experience in both reverse engineering and building a micro-service architecture for automated analysis.

Read More

How to make your employees care about cybersecurity

“If we look at security breaches over the last five to seven years, it’s pretty clear that people, whether it’s through accidental or intentional introduction of malware, represent the single most important point of failure in terms of security vulnerabilities,” said Eddie Schwartz, chair of ISACA’s Cyber Security Advisory Council.


Read More

Why Mobile Chats Are My First Source of Information for Investigations

With a Masters in Data Forensics Management, Timothy LaTulippe has assisted in complex investigations in both the public and private sectors, working with government agencies, Fortune 100 corporations and AM Law 100 firms. He wrote a post on why mobile chat rooms are my first source of information for investigations.


Read More


In mid-May 2017, many companies around the world were attacked by the WannaCry network crypto variant. The Wannacle malware spread across local networks and the Internet by exploiting the CVE-2017-0143 (MS17-010) vulnerability in components of the SMBv1 service (port TCP 445) in Windows operating systems. Since the industrial network is not directly connected to the Internet, and access is provided through the corporate network using NAT, a firewall and a corporate proxy server, which makes it impossible to infect such systems via the Internet. There are typical industrial network configuration errors, which have led to WannaCry infections, according to our data:


Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
computer forensics
mobile forensics
digital forensics software
Android forensics
iOS forensics
iphone forensics
Top Stories
Right Now
bstrings 1.0 released
Top Five
Heat Index
Chip-off Technique in Mobile Forensics
Extracting WhatsApp database and the cipher key from a non-rooted Android device
Extracting data from a damaged iPhone via chip-off technique
Free Course: Investigating Cybersecurity Incidents
Extracting data from a damaged iPhone via chip-off technique – Part 2