Browsing tag

Digital Forensics

New Internet Explorer zero-day vulnerability would allow local file theft

Internet Explorer is not exactly the most popular search engine, and this new security incident definitively won’t help. According to cyber forensics course specialists from the International Institute of Cyber Security (IICS), new zero-day vulnerability has been discovered in this search engine that makes Windows OS computers vulnerable to file theft attacks. According to the […]

Microsoft was hacked – Outlook and employees’ accounts have been hacked

Microsoft has revealed that a group of unknown hackers has perpetrated a data breach in some of the company’s systems; according to cyber forensics course experts from the International Institute of Cyber Security (IICS), hackers would have compromised the log in credentials of some members of the company’s technical support team, thanks to this, they […]

Ransomware attack cripples the South Carolina, U.S. systems

A ransomware attack forced the shutdown of all the computer operations of the city of Greenville, South Carolina, According to the cyber forensics course experts from the International Institute of Cyber Security, the attack forced the authorities to shut down most of their servers. Greenville officials, together with professionals from the rest of the U.S., […]

Pulse Secure, Cisco, F5 Networks and Palo Alto Networks business VPN services present security vulnerabilities, says Homeland Security

According to cyber forensics course specialists from the International Institute of Cyber Security (IICS) the services of virtual private networks (VPN) provided by some companies are vulnerable to security flaws that could allow an attacker to enter remotely into a company’s internal network. The cybersecurity area of the Department of Homeland Security issued an alert […]

Juniper switch vulnerability exposes login credentials

According to cyber forensics course specialists from the International Institute of Cyber Security (IICS), Juniper Networks has launched an unexpected update after discovering that some login credentials had been left on their data centers switches. Juniper Networks is a multinational company dedicated to network and security systems and is considered the main competence of Cisco. […]

Telegram TON Blockchain Network, a Tor’s alternative, will be launched soon

Telegram instant messaging service will launch a private beta test of your blockchain, Telegram Open Network (TON), reported cyber forensics course experts from the International Institute of Cyber Security (IICS). Features Telegram Open Network is designed to have superior speed and scalability. First of all, this means you can process millions of transactions in seconds. […]

CAINE 10.0 – GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE […]

Steam error allowed people to download any game for free

The person who reported the bug was rewarded with $20k USD A cybersecurity researcher discovered and reported a bug on Steam that allowed people to download any game available on the digital platform without paying for it, as reported by digital forensics experts from the International Institute of Cyber Security. Cybersecurity researcher Artem Moskowsky was responsible for […]

A jQuery plugin has been exploitable for 8 years

Different ways of exploiting the flaw have been widely spread too Out of the thousands of plugins for the jQuery framework, one of the most popular has hosted for at least three years an oversight in the code that remained hidden for the cybersecurity and digital forensics community, despite the availability of tutorials explaining how it could […]

How to become an expert in digital forensics

A review of the interesting work of the experts in digital forensics What exactly does a professional in digital forensics do? In general, experts in digital forensics are computer detectives that collect and analyze evidences of computers, networks and any other type of device with data storage capacities. In their role as Sherlock Holmes, the digital forensics experts will investigate the footprints of the […]

srum-dump – A Forensics Tool to Convert the Data in the Windows srum

srum-dump This program will create an excel spreadsheet containing forensics artifacts contained the SRUM (System Resource Utilization Manager) database. The program can be run with no input and it will prompt you for each of the needed arguments. The program requires two inputs. The first is an SRUM database. The SRUM database is usually Windowssystem32sruSRUDB.dat. […]

Hack Like a Pro: Digital Forensics for the Aspiring Hacker

In this tutorial, we will explore where and what the forensic investigator can find information about the activities of the suspect in their web browser. It’s important to note that this information will vary by operating system and browser. Here we will look briefly at Internet Explorer and go into a bit more depth on […]