MENU

Posts Tagged ‘windows 10 forensics’

Most Recent
 
Read More
2017-10-12

Hunting For In-Memory

Earlier, Joe Desimon told about the approach to finding traditional memory attacks along with in-depth analysis of many injection methods. In this article, the emerging trend of opponents using .NET in-memory methods to avoid detection will be investigated. Joe will consider both the strategies for defining events (in real time) and the strategies for determining these methods on demand. NET.

 

77
 
Read More
2017-10-07

RecentApps Registry Key

Jason ran into a hierarchy of keys / subkeys of the registry, which intrigued him. So he decided to write a blog “Registry Key RecentApps”. The top-level key, called RecentApps, contained links to several applications and files that were available on the system. In addition to the name of the application and the file, it found that the full path to the file and the last access to the file was available from the RecentApps key hierarchy.

361
 
Read More
2017-10-04

Windows 10 Protected Event Logs

Microsoft has performed the several major improvements to client security features in Windows 10. Windows 10 is the most secure version of all existing versions of the Windows operating system. In Windows 10 are used the most modern and now widely available hardware components to protect users and devices from modern cyber threats.

205
 
Read More
2017-10-03

The Trojan Target Government of Belarus

Group 42 Palo Alto Networks conducted a work in which it identified a number of phishing emails containing updated versions of the previously discussed CMSTAR malware family. The first mention of this time-honored program was in the spring of 2015, and then in 2016.

 

93
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.