UNC1142: Bitcoin Core Developer Targeted With Multiple Linux Backdoors
In this post, Matt Suiche explores a Linux breach and share some tactics, techniques, and best practices when dealing with it.
In this post, Matt Suiche explores a Linux breach and share some tactics, techniques, and best practices when dealing with it.
Magnet Forensics offers a variety of free digital forensics tools designed to assist in many aspects of digital forensics and incident response (DFIR).
Earlier this month, I reached out to my friend Valentina and told her I wanted to learn about macOS/iOS exploitation, so she recommended taking a look at the CVE-2021-30860 vulnerability, also known as FORCEDENTRY, and the prior work her friend Jeffrey Hofmann posted on Twitter.
How large was the last case you worked and how much data were you dealing with? I get a bit sentimental thinking back to some of the earlier days of my digital forensics casework. The good old days when a normal case consisted of a single desktop computer with maybe a few gigabytes of storage capacity—on the high end.
MF: Tell us about your life before becoming a Trainer.
ML: Prior to becoming a trainer, I worked as a digital forensic investigator within law enforcement. I worked on a wide variety of cases including fraud, large scale drug operations, murder, and child sexual offences. After my time in law enforcement, I became a university lecturer, specialising in mobile forensics and cyber security.
MF: Tell us about your life before becoming a Trainer.
DD: Before joining the Magnet family, I was a law enforcement officer for 25 years. Throughout my career, I was fortunate to be a part of many different units: patrol officer, school resource officer, Narcotics, Investigations, and Major Investigations. One thing our department didn’t have was a Computer Crimes Unit. Seeing a need, with the support of my chief, I started one.
One of my biggest motivating factors in seeing Magnet Forensics succeed over the years was to make sure we could truly achieve our mission to seek justice and protect the innocent.
We’re bringing back Magnet Virtual Summit for another great chance to bring together attendees from all skill levels with the leading global DFIR voices in the field.
In this blog you will learn about six reasons agencies should start developing mobile phone forensics capabilities now and how Magnet GRAYKEY can help support those goals.
Digital forensic professionals and Android users know the Android smartphone market is extremely fragmented. Broad Consent is the first step of many towards a future where we can provide users with more access to Android devices.