How to Get Started in Digital Forensics

If you want to become a digital forensic expert, be aware that when entering the field, you will be presented with an abundance of information that you will not know. It is a wonderfully challenging career path. Some believe that having the title of a … Continue reading How to Get Started in Digital Forensics

Cybersecurity Research During the Coronavirus Outbreak and After

It is about two and half years since we first open-sourced a tool for remote digital forensics called Bitscout. Today, I am happy to announce that we are releasing a new version of Bitscout, based on the upcoming release of Ubuntu 20.04, scheduled for April 2020. Continue reading Cybersecurity Research During the Coronavirus Outbreak and After

Know your enemy: Mapping adversary infrastructure quickly and accurately

Group-IB is a known quantity in the information security arena: in the sixteen years since its inception, the company – now headquartered in Singapore – has detected and detailed many high-profile threats, performed over a thousand successf… Continue reading Know your enemy: Mapping adversary infrastructure quickly and accurately

SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’

Thanks to SANS for publishing the SANS DFIR
superlative DFIR videos on their SANS DFIR YouTube Channel
Permalink
The post SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’ appeared first on Securi… Continue reading SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’

Small Cedarpelta Update

Good morning readers and welcome back! This is going to be a very short blog post to inform everyone that a very minor update to the Cedarpelta version of the Live Response Collection has been published. This change was needed, as it was pointed out by… Continue reading Small Cedarpelta Update

Phinally Using Photoshop to Phacilitate Phorensic Analysis

Hello again readers, and welcome back! Today’s blog post is going to cover the process that I personally use to rearrange and correlate RDP Bitmap Cache data in Photoshop. Yes, I am aware that some of you know me primarily for my Photoshop productions … Continue reading Phinally Using Photoshop to Phacilitate Phorensic Analysis

From IT to OT Security, Lesley Carhart – Paul’s Security Weekly #603

    Lesley Carhart is the Principal Threat Analyst at Dragos Inc.. Lesley has been performing digital forensics and incident response on unconventional systems and advanced adversary attacks for over a decade. Lesley will be discussing her transition f… Continue reading From IT to OT Security, Lesley Carhart – Paul’s Security Weekly #603