Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Magnet AXIOM Cyber 7.2 Is Now Available
In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated artifacts to keep your evidence sources current with the latest corporate applications and services. Try AXIOM Cyber for yourself, request a free trial today! SHA-256 Support Improved View [...]
Passware Kit Mobile 2023 v4 Now Available
What is new? GPU-accelerated password recovery for 30+ Qualcomm-based devices Application data extraction from Samsung, LG, Xiaomi, and other Qualcomm-based devices Email notification on the password recovery result Support for iOS 15.7.6 on iPhone 7, SE, and other A8/A9/A10 devices Passware Kit Mobile 2023 v4 is the first and only [...]
Utah leaders working to protect Utah’s elderly population from abuse, scams
A total of $15.9 million has been lost to fraud schemes in Utah just this year, according to a report from the Federal Trade Commission's Sentinel Network. Out of the top 10 report categories, imposter scams ranked the highest — with over 1,300 reports filed under losing money to those [...]
Email Malware Detection and Remediation:Tools and Techniques for Securing Your Communication
Email malware poses a significant threat to individuals and organizations, necessitating robust detection and remediation strategies to ensure secure communication channels. Detecting and remediating email malware requires a multi-layered approach, combining advanced security tools and techniques. This article explores the various tools and techniques available for detecting and remediating email [...]
Happy Memorial Day – We express our thanks!
We extend our warmest regards and thanks to all who have served their country and communities around the world - to protect and secure and at times sacrifice. Memorial Day (originally known as Decoration Day) is a federal holiday in the United States for honoring and mourning the U.S. military [...]
How Cybercriminals Exploit Human Vulnerabilities Phishing Attacks
Phishing attacks have gotten super tricky! Cybercriminals are now targeting our emotional weak spots to trick us into giving away sensitive information. In this article, we'll dive into their sneaky tactics and reveal how they use psychology to exploit us. 1. Psychological Manipulation: The Sneaky Game Plan Phishing attackers are [...]
Cyber Attacks – Learn about some of the most common types of attacks.
Today's cybercriminals are not part-time amateurs or script kiddies, but state-sponsored adversaries and professional criminals looking to steal information. While disruption and vandalism are still prevalent, espionage has replaced hacktivism as the second main driving force behind cyber attacks, after financial profit. Stay on top of your security training and [...]
What are the programming languages Cyber Security Experts should know?
Coding is an essential skill across almost every technological discipline today, and cybersecurity is no exception. Cybersecurity professionals must understand coding concepts in order to correctly interpret the activity of malicious actors on their networks, and they must be able to write code to perform their own work more efficiently [...]
Operation Cookie Monster – Criminal Marketplace Disrupted in International Cyber Operation
The Justice Department announced today a coordinated international operation against Genesis Market, a criminal online marketplace that advertised and sold packages of account access credentials – such as usernames and passwords for email, bank accounts, and social media – that had been stolen from malware-infected computers around the world. “Working [...]
X-Ways Forensics – the tool of choice for the “seasoned computer forensic analyst”
X-Ways Forensics software continues to be the number one choice for digital forensic examiners and analysts for complete and advanced computer and smart device (IoT) investigations and reporting. Teams are using X-Ways Forensics for rebuilding partitions and RAIDs, deep data carving, faster searching, more MetaData evidence, and other key features: [...]