Skip to main content
Digital Forensics

Digital Forensics Process

Digital Forensics Process Digital forensics investigates and analyzes digital evidence to understand cybercrimes and security issues. Legal processes utilising digital evidence must follow this systematic…
Sajin Shivdas
January 14, 2024

An Assorted Pick

Mobile Security

L3MON – Create FUD Payload and Hack Android Phone

Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam.…
Cyber Attack

Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer

When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the middle of…
Mobile_forensics_923
Digital Forensics

Mobile Forensics – Understanding Subscriber Identify Modules (SIM)

SIM or Integrated Circuit Card (ICC) is a microcontroller‐based smart card that stores important data including all the listed below Integrated circuit card identifier (ICCID)…
Cyber Attack
More than a hundred Cuban organizations paid over $60 million in ransom to cybercriminals after they were hit by ransomware.
Application Security
Important HTTP Security Headers for Your Website
Cyber Attack
Catalog of February 2021 Cyber Attacks and Data Breaches – 2.3 billion records breached
Cyber Security
The C2 log visualization tool “RedEye” has been released by CISA as open source Tool.
Cyber Attack
Catalog of May 2022 Cyber Attacks and Data Breaches – 49.8 million records breached
Cyber Attack
Catalog of January 2022 Cyber Attacks and Data Breaches – 66 million records breached