The subjects of my reads in the last week?Qubits, Collection#1, AS400, Lisp and….Game of Thrones!
How DNS tunneling can be used for data exfiltration? And how can be detected? DNS Tunneling is a technique that encodes data of other programs or protocols in DNS queries, including data payloads that can be added to an attacked DNS server and used to control a remote server and applications. DNS tunneling was originally […]
When a security incident occurs on your network, one of the most important steps of the response process is the identification of all assets involved by the attack.
Cybersecurity researchers Ran Dubin and Ariel Koren have developed a new platform form malware analysis, based on an AI engine.
Let’s starting a series of article related to digital forensic focused on mobile devices. In this first post i’d like to share some thoughts about image acquisition on android devices.