Ransomware and Blockchain Forensics
Introduction From individuals and small businesses to bigger organizations, one of the most prevalent threat types that society needs to be aware of is ransomware. It is a growing threat that ...
Ransomware and Blockchain Forensics
Introduction From individuals and small businesses to bigger organizations, one of the most prevalent threat types that society needs to be aware of is ransomware. It is a growing threat that ...
Advanced Cyber Threat Detection: Maximizing IoCs
Introduction One of the most critical components in cyber threat intelligence are indicators of compromise (IoCs). After a cyber security breach, attackers may leave a trace of their malicious ...
How AI Quakes the Digital Forensics Landscape
Introduction Artificial Intelligence (AI) is one of, if not, the fastest growing advancements in technology today. Aligning with this is the ubiquity of AI integrated into our everyday lives. ...
Introduction One of the uncanny sections of cyberspace is the dark web. When first learning about how the internet works, many do not go to the depths of the dark web. This is in large part due to ...
Distinguishing and Understanding Insider Threats
Introduction Insider threats are among one of the most prominent and detrimental challenges that cybersecurity and digital forensic professionals face today. Cybersecurity and Infrastructure ...
Memory Forensics: Importance of Analyzing Volatile Data
Introduction When looking for malware in a breached computer, it can reside in many different places. Traditionally, malware would be stored and saved in a file somewhere in the hard disk of the ...
Anti-Forensics: An Overview of Evasion Tactics
Introduction In the world of cybercrime, a decent hacker can find their way into a security system and exploit it. However, a good hacker is not only focused on breaching security systems but also ...
Challenges of Investigations in the Cloud
Introduction Cloud computing is a technology that provides computing services (applications, databases, networking, servers, etc.) in exchange for payment [7]. As cloud computing continues to ...
Digital Forensics Techniques to Detect Deepfakes
Introduction With the advancement of Artificial Intelligence (AI), digital manipulation tool sets have advanced into unprecedented levels. One of the most apparent are deepfakes, they have emerged ...
Reverse Engineering to Identify PhaaS Providers
Introduction In the 1990s, a group of hackers posed as employees of AOL. They used instant messaging and email to obtain users passwords and hijack their accounts. This is widely considered the ...