Search Results for: forensic investigation Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it... Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... Blog Post Emotet takedown – The Most Feared Cybercrime-as-a-Service is Dead February 8, 2021 Law enforcement authorities of several European countries joined their effort in a coordinated action against Emotet. As a result, the... Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations... Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms... Blog Post What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post Conti Ransomware Gang Announces Support of Russia – Ukrainian Member Leaks Chats February 28, 2022 To no one’s surprise, the infamous Conti ransomware gang, known for having close ties with Russian intelligence, announced that it... Knowledge Center 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic...
Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It...
Blog Post Digital Forensics: Phases and Importance February 14, 2022 Digital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests....
Blog Post Emotet takedown – The Most Feared Cybercrime-as-a-Service is Dead February 8, 2021 Law enforcement authorities of several European countries joined their effort in a coordinated action against Emotet. As a result, the...
Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations...
Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms...
Blog Post What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from...
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post Conti Ransomware Gang Announces Support of Russia – Ukrainian Member Leaks Chats February 28, 2022 To no one’s surprise, the infamous Conti ransomware gang, known for having close ties with Russian intelligence, announced that it...
Knowledge Center 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic...