#CyberForensics

2025-01-04

Yeti (Your Everyday Threat Intelligence) - A platform that manages forensics πŸ” intelligence and connects CTI with DFIR artifacts
Check it out πŸ”₯πŸ”₯:
github.com/yeti-platform/yeti

#threatintelligence #DFIR #CTI #cyberforensics #threatintel #threathunting #cybersecurity #infosec

Divine Magistratordivinemagistrator
2024-12-29

IMU and Sensor Functionality:
Drones utilize Inertial Measurement Units (IMUs) alongside optical sensors to gather environmental data. The activation of these sensors can occur unexpectedly, as seen in recent incidents where deleting certain apps triggered sensor responses.

This happened to my DJI MINI 2 , as soon as we took off all the social media apps on our phone, YES WE AUDITED THE CIRCUITS AT THE SAME TIME PHONE AND DROWN IT'S STARLINK SPYWARE

Divine Magistratordivinemagistrator
2024-12-29

Drones can act as aerial information gatherers through .User Interaction includes scanning QR codes and collecting data from mobile devices. Drone Technology features flight controllers and sensors. Data Processing uses image recognition and signal interception. Backend Systems involve cloud computing and predictive modeling. Ethical considerations are essential for compliance with privacy regulations and public trust.

OEIS Private Investigatoroeisinvestigation
2024-10-09

πŸ–₯️ Cyber Computer Forensics Services πŸ–₯️

OEIS Digital Private Investigator provides comprehensive cyber computer forensics services to recover and analyze critical data for investigations. Protect your business from digital threats with our expert team.

πŸ“ž Contact us today: +1-424-279-7170
πŸ”— Learn more: zurl.co/WZU8

East Africa Hi Tech Solutionseastafricahitechsolutions
2024-05-18

Computer Forensics Services in Kenya.

Our expert examiners utilize court-approved forensic methodologies to preserve, collect and examine evidence from:
βœ… Desktop and laptop computers
βœ… Server databases and email repositories
βœ… External storage devices like USBs and hard drives
βœ… Cloud storage and virtual environments
βœ… Mobile devices and tablets

Call 0714883783 Visit zurl.co/BD63

East Africa Hi Tech Solutionseastafricahitechsolutions
2024-05-15

Social Media Forensics Services.

At East Africa Hi Tech Solutions, We extract & analyze data from all major social media platforms using court-approved methodologies:
βœ… Facebook
βœ… Twitter
βœ… Instagram
βœ… LinkedIn
βœ… Snapchat
βœ… WhatsApp
βœ… & more

Contact us today to discuss your case requirements.

Visit zurl.co/qLgX or Call 0714 883783

Social Media Forensics  Services
East Africa Hi Tech Solutionseastafricahitechsolutions
2024-05-12

Digital Forensics in Kenya.

Our certified digital forensics team utilizes court-approved methodologies to preserve, collect & examine digital evidence for:

βœ… Criminal investigations
βœ… Corporate policy violations
βœ… Intellectual property disputes
βœ… Divorce & civil litigation cases
βœ… Fraud & embezzlement incidents
βœ… Data breach response
βœ… & more

Call 0714883783 Visit zurl.co/swv3

2024-04-11

Digital forensics firm with iPhone cracking technology lists Enforcement Directorate as one of its clients

Nextechno Gen, a Delhi-based cyber forensics firm, has access to tech from Cellebrite, an Israeli firm boasting of iPhone-cracking capabilities.

#ED #cellebrite #israel #iPhoneCracking #iphone #security #cyberforensics #india

thehindu.com/news/national/dig

:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified:zodmagus@infosec.exchange
2023-12-20

Finished day 19 yesterday but fell asleep before posting 🀣🀣. Memory forensics is definitely my. Love Volitility 2 and 3. #adventofcyber2023 #adventofcyber #z0ds3c #tryhackme #memoryforensics #cyberforensics #BlueTeam

:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified:zodmagus@infosec.exchange
2023-12-07
πŸ›‘ H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-11-02

"⚰️ Mozi Botnet's Mysterious Demise: The Kill Switch Discovery πŸ•΅οΈβ€β™‚οΈ"

Researchers at ESET have uncovered the kill switch that led to the abrupt downfall of the Mozi botnet, a notorious threat to IoT devices. The botnet's activity plummeted in August 2023, first in India and then in China, as a result of a control payload delivered via UDP, bypassing the BitTorrent DHT protocol. This strategic takedown raises questions about its orchestrators - the botnet creators themselves or Chinese law enforcement. πŸ€”πŸ’‘

Tags: #MoziBotnet #KillSwitch #CyberForensics #IoTSecurity #BotnetTakedown #ESETResearch #CyberSecurity #ThreatIntelligence

Credit: Ivan Beőina, Michal Škuta, Miloő ČermÑk via WeLiveSecurity

For a detailed analysis of the Mozi botnet's kill switch and its implications, stay tuned to ESET's upcoming publications. Meanwhile, explore the MITRE ATT&CK techniques used:

  • Resource Development: Acquiring infrastructure like virtual private servers.
  • Initial Access: Exploiting public-facing applications.
  • Persistence: Using boot or logon initialization scripts.
  • Exfiltration: Sending data over unencrypted protocols.
  • Impact: Stopping services and blocking access with iptables.

πŸ” MITRE ATT&CK - Mozi

2023-06-27

Advanced digital forensics and incident response (#DFIR), supported by the right investigative tools, can help organizations recover from cyber events and improve their overall defenses. In a new primer, we explore:

1. What DFIR is and why it's so important

2. Key challenges that #security teams face with DFIR

3. How the #SOC Visibility Triad can help teams overcome these challenges

Check it out ➑️ corelight.com/resources/glossa

#NetworkSecurity #NDR #IncidentResponse #DigitalForensics #CyberForensics #Cybersecurity #CyberDefense

2020-12-14

Comprehensive Guide on Autopsy Tool (Windows) - Autopsy is an open-source tool that is used to perform forensic operations on the disk image of th... hackingarticles.in/comprehensi #cyberforensics

2020-10-29

Memory Forensics: Using Volatility Framework - Cyber Criminals and attackers have become so creative in their crime type that they have started f... hackingarticles.in/memory-fore #cyberforensics

2020-10-26

Forensic Investigation: Shellbags - In this article, we will be focusing on shellbags and its forensic analysis using shellbag explore... hackingarticles.in/forensic-in #cyberforensics

2020-10-22

Forensic Investigation: Pagefile.sys - In this article, we will learn how to perform a forensic investigation on a Page File. There is a ... hackingarticles.in/forensic-in #cyberforensics

2020-10-20

Forensic Investigation: Disk Drive Signature - In this article, we will be using Disk Drive Signature to identify any suspicious changes in syste... hackingarticles.in/forensic-in #cyberforensics

2020-10-15

Forensic Investigation : Prefetch File - In this article, we are going to study an important artifact of Windows, i.e. prefetch files. Ever... hackingarticles.in/forensic-in #cyberforensics

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst