Skip to main content
Digital Forensics

Digital Forensics Process

Digital Forensics Process Digital forensics investigates and analyzes digital evidence to understand cybercrimes and security issues. Legal processes utilising digital evidence must follow this systematic…
Sajin Shivdas
January 14, 2024

An Assorted Pick

Application Security

PassGAN: New Artificial Intelligence Can Decipher Passwords in Thirty Seconds

Recent developments in artificial intelligence (AI) have made it feasible for computers to do tasks that were formerly considered to be beyond their capabilities. PassGAN,…
Cyber Attack

Catalog of March 2021 Cyber Attacks and Data Breaches – 21 million records breached

M arch was one of the leakiest months we've ever seen, with 151 documented occurrences while only recording 20,995,371 compromised information.In contrast, there were only…
Cyber Attack

Catalog of February 2021 Cyber Attacks and Data Breaches – 2.3 billion records breached

In February, a ransomware attack against Cloud service provider Accellion sent shockwaves through the cyber security industry.This was one of the worst months we've ever…
Malware
A Highly Complicated Redesign of the Raspberry Robin Worm
Cyber Security
Digital Forensics Handbook
Cyber Attack
European and North American Hackers have been linked to Attacks against the Chinese Government.
Cyber Security
The C2 log visualization tool “RedEye” has been released by CISA as open source Tool.
Cyber Attack
The State’s largest Oil Producer in Ohio reports feeling “no damage” from a recent Cyberattack.
Cyber Attack
CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application.