Content Industry: Enterprise
Emoting Over Emotet And Maldoc
Malicious documents in the form of email attachments have and continue to wreak havoc on individual users, the private business sector as well as local and federal government. According to Verizon’s 2018 Data Breach report, 32% of all data breaches derived from phishing attacks. Avanan email security reports that 1 in 25 branded emails is … Continued
Tips & Tricks // APK App Simulator
With the millions of applications available to users on Android devices, it becomes impossible for commercial tools to be able to parse and support them all. However, analyzing unsupported applications can sometimes be critical to your digital forensics investigations. In this session, we’ll explore one method of Android App Analysis by virtualizing the data using … Continued
Get The State of Corporate Digital Forensics in Cybersecurity 2021 from Magnet Forensics
Magnet Forensics has just released The State of Corporate Digital Forensics in Cybersecurity 2021 Report — highlighting trends and insights gathered from hundreds of corporate forensic examiners.
New in AXIOM Cyber & AXIOM 4.9: Load Files Beta, Easier Sharing of Portable Cases, New Export Customizations, and More!
Introducing Load Files Beta for AXIOM Cyber. Easier Sharing of Portable Cases, New Export Customizations, and More with Magnet AXIOM and AXIOM Cyber 4.9
Generating A Load File for eDiscovery Partners Using Magnet AXIOM Cyber
Did you know Magnet AXIOM Cyber has the ability to generate a load file, which forensic examiners can then share with eDiscovery teams for use in their tools such as Relativity or Concordance?
Cache Up Ep.34 Nicole Odom
INVESTIGACIONES FORENSES DIGITALES EN LA NUBE: BENEFICIOS Y DESAFIOS.
Cada vez es más común para las empresas y las agencias de procuración de justicia en LATAM enfrentarse a investigaciones que involucren servicios de la Nube, pues la virtualización de nuestras actividades como el trabajo remoto en línea es un escenario que la ciberdelincuencia está aprovechando para vulnerar redes y sistemas informáticos, pero también a … Continued
Methodology for Testing Forensic Hypothesis and Finding Truth
Why test? When examiners have questions, the answers are often found through testing. Where do you start? How do you test? What about documentation? How do you share your findings with the community? Jessica will share the lessons she’s learned and the best practices and methodology she’s developed to properly, efficiently, and effectively research and … Continued