4 WhatsApp alternatives, focused on privacy
The recent controversies related to new WhatsApp‘s Privacy Policy have lead many users to start looking for new alternatives.
Continue…The recent controversies related to new WhatsApp‘s Privacy Policy have lead many users to start looking for new alternatives.
Continue…Recently I’ve already written about Cobalt Strike detection during forensics analysis. However, some followers asked my if it was possibile to perform this activities using Volatility, in order to integrate them in existing analysis workflows.
Continue…Today I want to briefly take up a topic already addressed in a previous post: analysis of Windows 10 memory dumps using Volatility 2.
Continue…Sometimes, during an incident analysis, you may need to replicate behaviours of a specific host, perhaps already acquired with a forensic method.
Continue…During a forensic analysis on mobile devices, especially when you are not able to perform a full memory acquisition, a network traffic analysis could be useful in order to identify suspicious activities.
Continue…Today I’d like to share a brief list of useful tools I use for OSX analysis.
Continue…In order to expand the address space that is effectively usable by a process and to expand the amount of dynamic RAM, modern operating systems use the method known as swapping.
Continue…A simple step-to-step tutorial for iOS full acquisition.
Continue…A brief update on Cobalt Strike detection in forensics analysis, with a couple of new resources.
Continue…Some privacy concerns about Apple Silicon and MacOs Big Sur.
Continue…