Hayden Covington at Black Hills Information Security.Ransomware Groups Pivoting Away from Encryption PowerShell: Great Ransomware Tool or Greatest Ransomware Tool?ĭetection Engineering and SOC Scalability Challenges (Part 2)Įmulating the Controversial and Intriguing Rhysida Ransomwareīreaking Down the Remcos Malware Attempts on Colombian Banks Unmasking a Sophisticated Phishing Campaign That Targets Hotel Guests Threat Intelligence with MISP: Part 2 - Setting up MISP PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions Bill Marczak, John Scott-Railton, Daniel Roethlisberger, Bahr Abdul Razzak, Siena Anstis, and Ron Deibert at The Citizen Lab.iOS 17 Forensics: Another Year, Another Byte of the AppleĪ Complete Guide for SQL Database Recovery.Forensic Science International: Digital Investigation.Graph Machine for DFIR with CHRYSALIS, by Mario Pérez ICloud Advanced Data Protection: Implications for Forensic ExtractionĬado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic Super Resolution from Different PerspectivesĪ SIEM On the Cheap – Using Sqlite for Data Analysis If you haven’t seen, I’ve also been writing my thoughts on some of the articles posted weekly at /thisweekin4n6! FORENSIC ANALYSIS As always, thanks to those who give a little back for their support!
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |