The most important file in a NTFS filesystem During a forensics analysis, after evidence acquisition, the investigation starts by doing a timeline analysis, that extract from the images all information on when files were modified, accessed, changed and created.
Useful in forensics analysis and incident response
After all, the BSOD is also a useful feature! The researchers of security firm Kryptos Logic has performed an extensive analysis of well known WannaCry ransomware. One of the findings is really interesting (and funny!): WannaCry can infect machines that still run Windows XP, but XP is so unstable and crashes too much to correctly spread […]
Google Project Zero’s researchers have discovered another critical remote code execution vulnerability in Microsoft’s Windows, and it seems something truly bad! UPDATE Microsoft immediately releases a fix, and ProjectZero releases vulnerability details: During the weekend, the Project Zero’s researchers Tavis Ormandy and Natalie Silvanovich announced that they have discovered “the worst Windows remote code execution vulnerability […]
…turn off your Windows computers for the weekend and go enjoy the nice weather!