Posts for category: Forensics Weekly Executive Summmaries

Ransomware and Blockchain Forensics

Introduction From individuals and small businesses to bigger organizations, one of the most prevalent threat types that society needs to be aware of is ransomware. It is a growing threat that ...

Advanced Cyber Threat Detection: Maximizing IoCs

Introduction One of the most critical components in cyber threat intelligence are indicators of compromise (IoCs). After a cyber security breach, attackers may leave a trace of their malicious ...

How AI Quakes the Digital Forensics Landscape

Introduction Artificial Intelligence (AI) is one of, if not, the fastest growing advancements in technology today. Aligning with this is the ubiquity of AI integrated into our everyday lives. ...

Tapping into the Dark Side

Introduction One of the uncanny sections of cyberspace is the dark web. When first learning about how the internet works, many do not go to the depths of the dark web. This is in large part due to ...

Distinguishing and Understanding Insider Threats

Introduction Insider threats are among one of the most prominent and detrimental challenges that cybersecurity and digital forensic professionals face today. Cybersecurity and Infrastructure ...

Memory Forensics: Importance of Analyzing Volatile Data

Introduction When looking for malware in a breached computer, it can reside in many different places. Traditionally, malware would be stored and saved in a file somewhere in the hard disk of the ...

Anti-Forensics: An Overview of Evasion Tactics

Introduction In the world of cybercrime, a decent hacker can find their way into a security system and exploit it. However, a good hacker is not only focused on breaching security systems but also ...

Challenges of Investigations in the Cloud

Introduction Cloud computing is a technology that provides computing services (applications, databases, networking, servers, etc.) in exchange for payment [7]. As cloud computing continues to ...

Digital Forensics Techniques to Detect Deepfakes

Introduction With the advancement of Artificial Intelligence (AI), digital manipulation tool sets have advanced into unprecedented levels. One of the most apparent are deepfakes, they have emerged ...

Reverse Engineering to Identify PhaaS Providers

Introduction In the 1990s, a group of hackers posed as employees of AOL. They used instant messaging and email to obtain users passwords and hijack their accounts. This is widely considered the ...