Skip to main content
Digital Forensics

Digital Forensics Process

Digital Forensics Process Digital forensics investigates and analyzes digital evidence to understand cybercrimes and security issues. Legal processes utilising digital evidence must follow this systematic…
Sajin Shivdas
January 14, 2024

An Assorted Pick

Cyber Security

The C2 log visualization tool “RedEye” has been released by CISA as open source Tool.

RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States' Cybersecurity and Infrastructure Security Agency (CISA).…
Cyber Attack

Cybersecurity Experts have identified six emerging dangers for the year 2023. Problems with automobiles being acked, Automated Cyberattacks, the ChatGPT threat, and more

Security risks increase in tandem with the development of new technologies. The discipline of cybersecurity is evolving rapidly in response to new risks. These are…
Cyber Attack

Increased Interest in Industrial Security Products due to Cyber Threats.

Manufacturers are fortifying operational technology and vehicle platforms to close down high-risk vulnerabilities, ISG Provider Lens™ report says STAMFORD, Conn.--(BUSINESS WIRE)--Increased automobile and industrial operational…
Cyber Security
Digital Forensics Handbook
Cyber Attack
IBM: Whilst 2017 saw a significant decrease in the prevalence of ransomware, cyberattacks have increased in frequency and intensity.
Utilities
GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning
Mobile acquisition_01
Digital Forensics
Mobile Forensics – Acquisition Phase
Cyber Attack
Catalog of October 2022 Cyber Attacks and Data Breaches – 9.9 Million Records Breached
Cyber Attack
Catalog of November 2021 Cyber Attacks and Data Breaches – 223.6 million records breached