Smart Forensics for the Internet of Things (IoT)

The expanding Internet of Things brings new attack vectors, and cybersecurity experts will need new methods of incident response and forensics to keep up.

The post Smart Forensics for the Internet of Things (IoT) appeared first on Security Intelligence.

Continue reading Smart Forensics for the Internet of Things (IoT)

Capsule8: Container-aware real-time threat protection

Despite massive adoption of Linux in the enterprise, there has been no world-class security offering for Linux infrastructure — until now. In this podcast recorded at RSA Conference 2017, Dino Dai Zovi, CTO at Capsule8, illustrates how they’re pioneering the industry’s first container-aware real-time threat protection platform designed to proactively protect legacy and next-generation Linux infrastructure from both known and unknown attacks. Here’s a transcript of the podcast for your convenience. My name is Dino … More Continue reading Capsule8: Container-aware real-time threat protection

Bank with No Firewall. That’s How Hackers Managed to Steal $80 Million

In Brief
Investigators from the Forensic Training Institute of the Bangladesh investigated the $80 Million bank heist and discovered that the hackers managed to gain access to the network because the Bank was using second-hand $10 network switches without a Firewall to run its network.

When it was reported last month that an unknown hacking group attempted to steal $1 Billion from

Continue reading Bank with No Firewall. That’s How Hackers Managed to Steal $80 Million

Digging into Windows Prefetch: Device Profiling

It wasn’t that long ago that every report I read containing Windows prefetch artifacts included only the basics: executable name, first and last time executed (now eight timestamps in Win8), and number of executions. There is much more information stored in prefetch files, but until recently there were few tools to easily parse and provide it […] Continue reading Digging into Windows Prefetch: Device Profiling

Digging into Windows Prefetch: Device Profiling

It wasn’t that long ago that every report I read containing Windows prefetch artifacts included only the basics: executable name, first and last time executed (now eight timestamps in Win8), and number of executions. There is much more information stored in prefetch files, but until recently there were few tools to easily parse and provide it […] Continue reading Digging into Windows Prefetch: Device Profiling

What’s New in Windows Application Execution?

One of the great pleasures of performing Windows forensics is there is no shortage of application execution artifacts.  Application execution tells us what has run on a system and is often the pivot point that reveals important activity on the system.  Why was FTP run on this workstation?  Is it normal to see execution of […] Continue reading What’s New in Windows Application Execution?

What’s New in Windows Application Execution?

One of the great pleasures of performing Windows forensics is there is no shortage of application execution artifacts.  Application execution tells us what has run on a system and is often the pivot point that reveals important activity on the system.  Why was FTP run on this workstation?  Is it normal to see execution of […] Continue reading What’s New in Windows Application Execution?

Computer Forensics Job Opening

The Baltimore Police Department has an opening for a Computer Forensics examiner.

The link to the post is here:

Computer Forensic Examiner Opening

Job Title:Computer Forensic Examiner I
Closing Date/Time:Fri. 11/08/13 4:30 PM Eastern Time
Salary:$25.07 – $31.23 Hourly
$45,630.00 – $56,836.00 Annually
Job Type:MERIT
Location:Towson, Maryland Continue reading Computer Forensics Job Opening