Acquiring Publicly Available Facebook Information
Learn how to acquire, process, and examine public Facebook activity data, including a user’s friends list and posts.
Learn how to acquire, process, and examine public Facebook activity data, including a user’s friends list and posts.
A lot has been shared about the MITRE ATT&CK framework and how it can be leveraged as a powerful hunting resource and a threat modeling foundation. In this presentation, Mary Ellen will cover a different way of using MITRE ATT&CK – during a forensic investigation.
It’s not a matter of if a ransomware attack will be successful, but when.
In this blog, we will provide some background information, resources, and tools to help you prepare for Chromebook investigations.
Forensic Examiners today are faced with supporting an ever-growing range of evidence and investigation types.
We have a slew of new things in AXIOM Cyber which will make your investigations faster, more efficient, and stronger than previous versions of AXIOM Cyber.