Posts related to information security, including news, tutorials, malware analysis, and threat intelligence.
To help protect their customers from malicious and junk emails, Google and Yahoo have announced that they will begin to enforce additional requirements for…
Firewall logs provide a wealth of information about a network. They can be used to identify devices, troubleshoot policies, and…
Business Email Compromise (BEC) attacks are easy, cheap, and often very effective. This high Return on Investment makes BEC an…
This article was last updated on 2022-01-03. After several Log4j vulnerabilities (known as Log4shell or LogJam in the tech press)…
Volatility is a powerful memory forensics tool. This guide will show you how to install Volatility 2 and Volatility 3…
DNS describes the structure of resources on the internet. It can provide lots of valuable information about (attacker or target)…
The Domain Name System (DNS) is best known as the way domain names are converted into IP addresses that clients…
Recently I analyzed a credential harvesting page with some interesting characteristics that made a great teaching moment. In this post,…
The Parler data dumps you've heard were obtained legally. Here's how they did it.
If you receive a fraudulent email, can be very useful to send a full forensic copy to an organization that…