18th September – Threat Intelligence Report.Will the Real Slim Shady Please Stand Up? Check Point Research Exposes Cybercriminal Behind Malicious Software Impacting EMEA and APAC.Sintesi riepilogativa delle campagne malevole nella settimana 16 – 22 Settembre 2023 Silent Skimmer: Online Payment Scraping Campaign Shifts Targets From APAC to NALA Stop Phishing Yourself: How Auto-Forwarding and Exchange Contacts Can Stab You in the Back Hayden Covington at Black Hills Information Security.Ransomware Groups Pivoting Away from Encryption PowerShell: Great Ransomware Tool or Greatest Ransomware Tool?ĭetection Engineering and SOC Scalability Challenges (Part 2)Įmulating the Controversial and Intriguing Rhysida Ransomwareīreaking Down the Remcos Malware Attempts on Colombian Banks Unmasking a Sophisticated Phishing Campaign That Targets Hotel Guests Threat Intelligence with MISP: Part 2 - Setting up MISP PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions Bill Marczak, John Scott-Railton, Daniel Roethlisberger, Bahr Abdul Razzak, Siena Anstis, and Ron Deibert at The Citizen Lab. iOS 17 Forensics: Another Year, Another Byte of the AppleĪ Complete Guide for SQL Database Recovery.Forensic Science International: Digital Investigation.Graph Machine for DFIR with CHRYSALIS, by Mario Pérez ICloud Advanced Data Protection: Implications for Forensic ExtractionĬado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic Super Resolution from Different PerspectivesĪ SIEM On the Cheap – Using Sqlite for Data Analysis If you haven’t seen, I’ve also been writing my thoughts on some of the articles posted weekly at /thisweekin4n6! FORENSIC ANALYSIS As always, thanks to those who give a little back for their support!
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |