MENU

News
Most Recent
 
Read More
2018-03-02

New Windows artifacts: Background Activity Moderator (BAM)

The consultant on IT and computer forensics Costas Katsavunidis described in the article the alternative to the pre-selection -> Bam.

2471
 
Read More
2018-02-28

APFS data leak bug

The Apple expert discovered in the operating system macOS vulnerability of the file system APFS, which under certain conditions can lead to the loss of MacOS data. The error is related to how the operating system processes resolved APFS images formatted in APFS format on the Apple file system.

147
 
Read More
2018-02-28

VBA Macro code analysis

Malware authors always find a unique way to distribute and run malicious software. Cyber attacks are becoming more and more every year. BALAJI is a certified ethical hacker in a security researcher in Comodo Security. He wrote an article about Distributive Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code.

225
 
Read More
2018-02-28

Cobalt Strike Beacon C2 using Amazon APIs

AWS provides services that help you create complex applications with increased flexibility, scalability and reliability, sufficient processing power, storage for databases, delivery and other functionality.

212
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.