Digital Forensics & Investigation

Community Initiatives Cyber Security Events & Conferences Malware Analysis

North Korean Hackers Exploit Fake IT Worker Schemes and Malicious Interview Lures

North Korean state-backed hackers are running large-scale fake IT worker and “Contagious Interview” campaigns that abuse developer hiring workflows to deliver JavaScript-based malware, steal code and credentials, and covertly generate.

Read More
Malware Analysis

Fake CAPTCHA Attack Chain Triggers Enterprise-Wide Malware Infection in Organizations

Fake CAPTCHA (ClickFix) pages are enabling threat actors to turn a single user click into an enterprise‑wide compromise, as seen in a recent incident affecting a major Polish organization. The.

Read More
Digital Forensics

EDR-Freeze: Technical Mechanics and Forensic Artifacts Exposed

EDR-Freeze is a proof-of-concept tool that forces endpoint detection and response (EDR) or antivirus processes into a temporary “coma.” Instead of installing a vulnerable driver, it leverages legitimate Windows Error Reporting components, specifically.

Read More
Digital Forensics & Investigation

Play This Game for Free on Steamery are weekend games

WelcRimply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of.

Read More
OSINT & Threat Intelligence

George is a tays paul and solved ever boateng eepingr .

WelcRimply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of.

Read More
Digital Forensics

Forensic-timeliner: A Windows Forensics Tool for DFIR Investigators

Forensic-Timeliner is a fast, open-source command-line tool designed to help digital forensics and incident response (DFIR) teams quickly build a unified timeline of Windows artifacts. By automatically collecting, filtering, and.

Read More
Digital Forensics

iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spyware

As iOS 26 is being rolled out, a critical forensic challenge has emerged: the operating system now automatically overwrites the shutdown.log file on every reboot, effectively erasing crucial evidence of.

Read More