Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Oxygen Forensic® Detective v.15.3 is here!
Version 15.3 of Oxygen Forensic® Detective (OFD) is available. This version comes equipped with: LastPass cloud extraction Import of Tinder Archives Support for various new mobile apps Support for over 34,800 Apps Brute force enhancements for Samsung, Huawei, and Motorola devices based on MTK chipsets LastPass Cloud Extraction LastPass is [...]
How will Microsoft Keep ChatGBT from creating Deepfake and Protecting Copyrighted Materials
"After announcing its new Edge browser and updated Bing search engine that integrates a ChatGPT experience via OpenAI last week, Microsoft opened up a waitlist for the feature. Now the first users are getting access to the capability. However, it’s only on desktop for now with Microsoft saying iOS and Android [...]
Social Engineering at the Stadium
At a recent CheckPoint / Avanan event I had an opportunity to see social engineering tactics at an American Football stadium. As a fan of an opposing team, I liked seeing the messaging the HOME team was sending opponents. Great messaging to [...]
Digital Intelligence’s FRED-L / Triage. Acquire. Analyze. Solve.
Experience you can count on. Digital Intelligence has shipping FRED-L’s since 2004, perfecting it for digital forensics the last 19-years. The FRED-L (Forensic Recovery of Evidence Device) is a high performing forensic laptop built to handle forensic triage, acquisition, and analysis challenges. FRED-L’s are engineered for performance, flexibility, and reliability. [...]
Magnet AXIOM Cyber update version 6.10.0.34490
Magnet AXIOM Cyber builds upon the capabilities of Magnet AXIOM. So now, you can acquire and analyze evidence from computer, cloud, and mobile sources, and also get point-to-point remote acquisition, a covert on-demand agent, acquisition from cloud services, and automatically resumed collection. Learn more here: Simplify your investigations with Magnet AXIOM [...]
What is Cyber Security?
Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. What are the different types of cybersecurity threats? Malware is a form of malicious software [...]
X-Ways Forensics – The best Computer Forensics DFIR Tool
X-Ways Forensics has become the most turned to tool for computer forensics, cyber analysis, and DFIR teams. There seems to be six to seven tools found in almost every digital / smartphone / data recovery forensic labs in the world: Cellebrite UFED Touch3 or 4PC or a variation of the [...]
Thoma Bravo to Buy Magnet Forensics and combine their technology with GrayKey
Grayshift and Magnet Forensics have partnered to deliver powerful solutions –GrayKey and Magnet AXIOM - gether, these best-in-class technologies give law enforcement the critical edge in mobile forensic investigations. Thoma Bravo said its newly created Morpheus unit will acquire Magnet Forensics for approximately $1.3 billion and take the company private. [...]
What appears as document from DocuSign is really a phishing attack with embedded htm malware
The Blank Image Attack is where hackers are placing blank images within HTML attachments. When opening the attachment, the user is automatically redirected to a malicious URL. Vector: Email Type: Malware Techniques: Social Engineering, Blank Image, HTML Redirect Target: Any end-user “The hackers are hiding the malicious URL inside an [...]
Hack the Pentagon 3.0 CVDD
Seems the US Government is looking to be hacked. All qualified hackers are invited to bid and be paid to help protect the country's networks. This is a cool and curious approach, and hopefully some great teams do their job and help support cyber defense teams. Notes from the Statement [...]