Trojan Horse Malware Forensic Analysis
Executive Summary Trojan horses, or “Trojans” colloquially, are commonly used to steal sensitive information, allow remote access to computers and even delete data on them. Using common sense ...
Trojan Horse Malware Forensic Analysis
Executive Summary Trojan horses, or “Trojans” colloquially, are commonly used to steal sensitive information, allow remote access to computers and even delete data on them. Using common sense ...
Worm Malware Forensic Analysis
Executive Summary Worms are a unique form of malware which spread across networks without an attacker needing to guide it. They can cause system slowdowns, data corruption, and unauthorized access ...
Stable Diffusion Forensic Analysis
Executive Summary Stable Diffusion is a program which can use artificial intelligence to generate images based on the prompts the user enters into it. Since its launch in August 2022, AI generated ...
Euler Hermes Group Deepfake Forensic Analysis
Executive Summary In March of 2019, an unnamed company involved with Euler Hermes had $243,000 stolen from them by scammers who used a deepfake of the CEO to convince the company’s leadership to ...
Ransomware and Blockchain Forensics
Introduction From individuals and small businesses to bigger organizations, one of the most prevalent threat types that society needs to be aware of is ransomware. It is a growing threat that ...
Advanced Cyber Threat Detection: Maximizing IoCs
Introduction One of the most critical components in cyber threat intelligence are indicators of compromise (IoCs). After a cyber security breach, attackers may leave a trace of their malicious ...
How AI Quakes the Digital Forensics Landscape
Introduction Artificial Intelligence (AI) is one of, if not, the fastest growing advancements in technology today. Aligning with this is the ubiquity of AI integrated into our everyday lives. ...
Introduction One of the uncanny sections of cyberspace is the dark web. When first learning about how the internet works, many do not go to the depths of the dark web. This is in large part due to ...
Distinguishing and Understanding Insider Threats
Introduction Insider threats are among one of the most prominent and detrimental challenges that cybersecurity and digital forensic professionals face today. Cybersecurity and Infrastructure ...
Memory Forensics: Importance of Analyzing Volatile Data
Introduction When looking for malware in a breached computer, it can reside in many different places. Traditionally, malware would be stored and saved in a file somewhere in the hard disk of the ...