ByViktor SobieckiOctober 30, 2024Forensic Analysis of Telegram MessengerNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiOctober 30, 2024How to use sandboxes without technical skillsCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiOctober 30, 2024New Windows artifacts: Background Activity Moderator (BAM)News & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiOctober 30, 2024Unlock or decrypt an APFS driveNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiOctober 25, 2024Incident Response Forensic Framework OverviewCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiJune 16, 2022How to detect proxies and network traffic with VolatilityNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiJune 16, 20228 SANS courses in London, 29 February – 5 March, 2016News & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiJune 16, 2022How to make a computer forensic image forensically bootableNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiJune 16, 2022Lists of memory forensics toolsCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiJune 16, 2022iOS 11: HEVC and HEIFNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams