In the tumultuous landscape of cybersecurity, the year 2023 left an indelible mark with the brazen exploits of the Scattered Spider threat...
The cybersecurity community understands as cyber forensics the procedures and methodological techniques to identify, collect, preserve, extract, interpret, document and present the...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti...
Windows is the most common operating system. There are many organizations who prefer windows OS. Windows is also most targeted operating system...
DFIRtriage is a tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to...
It is important to remember that implementing incident response steps is a process and not an isolated event. For a truly successful...
In order for an organization to properly respond to a breach or incident, they need to have a proper incident response team....
nightHawkResponse is a custom built application for asynchronus forensic data presentation on an Elasticsearch backend. This application is designed to ingest a...
Redline provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of...
AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output...
Mozilla Investigator MIG is a platform to perform investigative surgery on remote endpoints. It enables investigators to obtain information from large numbers...
Cyber Incident Response Tools are more often used by security industries to test the vulnerabilities and provide an emergency incident response to...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti...
Loki is a free and simple IOC (Indicators of Compromise) scanner, a complete rewrite of main analysis modules of the APT Scanner...
WEFFLES is designed to be small and lightweight, both for speed of getting something deployed during an Incident Response and also for...
FLARE VM is the first of its kind freely available and open sourced Windows-based security distribution designed for reverse engineers, malware analysts,...
Cyphon is a big data platform that aggregates, standardizes, and enhances data for easier analysis. Many businesses rely on emails to manage...