How much free computer forensics courses do you know? Do you know what Blackbag has a free forensic training?
D3pak Kumar shared his version of the Glossary. The glossary contains a lot of terms of computer forensics and email forensics.
Many are already familiar with the television series “Mr Robot”. The story of a young programmer Elliot suffering from antisocial personality disorder, a security engineer by day and by night a hacker. Thus, it appears quickly in a place where the interests of his employer – a company engaged in cyber security – and underground organizations that are trying to recruit him for the purpose of the collapse of the most powerful US corporations. In the television series set of lines that are of particular importance for the SOC managers.
The number of cyber-attacks is growing every day. Constantly there are new and complex threats, cybercriminals use clever tricks to bypass existing security technologies. For safety reasons it is not enough traditional solutions, such as antivirus, firewall and intrusion prevention system. Therefore resorted to Threat Intelligence System (TI) recently to protect the data.
Johnny Appleseed shared the article “Basics of Windows Incident Response”.
Not so long ago was a post in which it is revealed that, some advanced malware can detect a virtual environment such as a sandbox to avoid detection and analysis. Due to the fact that, some threats can also detect monitoring tools used for malware analysis, these malware will not run to seem harmless. It was created a quick proof of concept (POC), to demonstrate the defensive tactics. Some malware use a mutex or registry key (a previous version of Locky).