P-Testing / D-Forensics

P-Testing / D-Forensics


WHAT’S THE DIFFERENCE? The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led manysecurity …


Zero-Click Attacks against Smartphones

The rapid increasing use of smartphones for communications, such as banking and social networking, has made them an attractive target for cyber criminals. These malicious actors used social engineering to lure victims into clicking a malicious link or pressing a button, thereby causing the malware to execute, proliferate and compromise the victim’s smartphone successfully. However, …

Zero-Click Attacks against Smartphones Read More »

Phone Extraction | Technical Perspective

General explanation of mobile phone extraction, Mobile Phone Extraction technologies, known also as mobile forensics, entails the physical connection of the mobile device that is to be analysed and a device that extracts, analyses and presents the data contained on the phone. Whilst forensics experts, hackers and those selling spyware may be able to access …

Phone Extraction | Technical Perspective Read More »

How they do Cyber Espionage activity using USB Devices

Initial infection vector to performs cyber espionage activity, currently being tracked as UNC4191, which leverages USB devices as an initial infection vector, and concentrates on the Philippines. These operations have affected various public and private sector entities primarily in Southeast Asia and extending to the U.S., Europe, and the APJ (Asia Pacific and Japan) region. …

How they do Cyber Espionage activity using USB Devices Read More »

Windows Forensics | Last open, Last saved File

Digital Forensic artifacts are that we rely upon. Nowhere is this more true than in the Windows Registry. With no specification and even Microsoft products not following any data storage methodology, it is about as haphazard and irregular as they come. As an example, let’s look at the OpenSaveMRU and LastVisitedMRU Registry keys. Both have …

Windows Forensics | Last open, Last saved File Read More »

Malware Analysis | Basics

Malware has been around for as long as computers have been in common use. Any computer program that performs malicious activities is classified as malware. There are many types of malware ranging from sophisticated self-propagating worms, destructive logic bombs, ransomware, to harmless pranks. Everyone who regularly uses a computer will encounter malware at some point. …

Malware Analysis | Basics Read More »

error: Content is protected !!