5 free digital forensics tools to boost your investigations

Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information for auditors, legal teams, and law enforcement agencies in … Continue reading 5 free digital forensics tools to boost your investigations

Emerging trends and strategies in digital forensics

In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks on digital evidence collection. Schroader talks about the impact of exponential d… Continue reading Emerging trends and strategies in digital forensics

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail to orchestrate the proper resp… Continue reading The dangers of dual ransomware attacks

Velociraptor: Open-source digital forensics and incident response

Velociraptor is a sophisticated digital forensics and incident response tool designed to improve your insight into endpoint activities. Velociraptor enables you to conduct precise and rapid collection of digital forensic data across multiple endpoints … Continue reading Velociraptor: Open-source digital forensics and incident response

Operation Triangulation: iOS devices targeted with previously unknown malware

While monitoring the traffic of our own corporate Wi-Fi network, we noticed suspicious activity that originated from several iOS-based phones. We created offline backups of the devices, inspected them and discovered traces of compromise. Continue reading Operation Triangulation: iOS devices targeted with previously unknown malware

Threat actors can exfiltrate data from Google Drive without leaving a trace

Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or insider, Mitiga researchers say. A problem for digital forensic analysts and incident responders &#8220… Continue reading Threat actors can exfiltrate data from Google Drive without leaving a trace

Digital forensics and incident response: The most common DFIR incidents

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more.
The post Digital forensics and incident response: The most common DFIR incidents appeared first on TechRepublic.
Continue reading Digital forensics and incident response: The most common DFIR incidents

Complexity, volume of cyber attacks lead to burnout in security teams

The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential regulatory risk, according to Magnet Forensics. “Digital forensics and incident response teams have pr… Continue reading Complexity, volume of cyber attacks lead to burnout in security teams