Skip to main content
Digital Forensics

Digital Forensics Process

Digital Forensics Process Digital forensics investigates and analyzes digital evidence to understand cybercrimes and security issues. Legal processes utilising digital evidence must follow this systematic…
Sajin Shivdas
January 14, 2024

An Assorted Pick

Cyber Security

The C2 log visualization tool “RedEye” has been released by CISA as open source Tool.

RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States' Cybersecurity and Infrastructure Security Agency (CISA).…
Cyber Attack

CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application.

According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera Faspex file transfer…
Cyber Attack

Healthcare Cybersecurity in 2023: In spite of the positive development of Hive’s closure, cyberattacks are becoming increasingly common.

First, the good news: After a lengthy investigation lasting several months, the FBI was able to put an end to the Hive ransomware group. More…
Mobile_forensics_923
Digital Forensics
Mobile Forensics – Understanding Subscriber Identify Modules (SIM)
Cyber Attack
IBM: Whilst 2017 saw a significant decrease in the prevalence of ransomware, cyberattacks have increased in frequency and intensity.
Cyber Attack
The Most Dangerous Cybersecurity Risks of 2023 and What You Can Do to Prevent Them
Cyber Attack
Ferrari Cyberattack Exposes Customer Data
Cyber Attack
The Singha Durbar Server Continues to be the Target of Cyberattacks.
Cyber Security
Digital Forensics Handbook