Skip to main content
Digital Forensics

Digital Forensics Process

Digital Forensics Process Digital forensics investigates and analyzes digital evidence to understand cybercrimes and security issues. Legal processes utilising digital evidence must follow this systematic…
Sajin Shivdas
January 14, 2024

An Assorted Pick

Mobile Security

L3MON – Create FUD Payload and Hack Android Phone

Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam.…
Cyber Attack

The State’s largest Oil Producer in Ohio reports feeling “no damage” from a recent Cyberattack.

Encino Energy, one of the largest private natural gas and oil producers in the U.S., said it has investigated and remediated a recent cyberattack. The…
Cyber Security

Microsoft Expands its Automated Attack Disruption to Include Business Email compromise and Ransomware.

Microsoft promoted a feature of 365 Defender at last year's Ignite conference; this feature can automatically identify and disrupt a cyberattack while it's happening, with…
mobile forensics tools_00212
Digital Forensics
Mobile Phone Forensics Tools and Utilities
Cyber Attack
Methods for Identifying Potentially Dangerous Events
Cyber Attack
Catalog of June2022 Cyber Attacks and Data Breaches – 34.9 Million Records Breached
Cyber Attack
K-12 schools in Tucson, Nantucket respond to cyberattacks
Cyber Attack
Catalog of August 2022 Cyber Attacks and Data Breaches – 97 Million Records Breached
OSINT
OSINT – Open Source Intelligence Tools and Resources