News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​forensics: Convenience plays into the hands of cybercriminals
Cyber ​​forensics: Convenience plays into the hands of cybercriminals - Image by Mohamed Hassan on Pixabay

Cyber ​​Forensics: The latest Active Adversary Report from Sophos uncovers an interesting turnaround that addresses a common problem in IT security: convenience. Hard-working attackers exploit this mercilessly. In previous case data from the report, which analyzes actual cyberattacks, exploiting vulnerabilities was the leading cause of attacks, closely followed by compromised credentials. In the first half of 2023, this picture reverses significantly, and for the first time, compromised access data was the top cause at 50%. The exploitation of a vulnerability was 23%. Stolen login credentials…

Read more

Forensics of real cyber attacks reveals attackers' tactics
SophosNews

Detailed investigation of the cases taken over by the Sophos Incident Response Team shows that attackers spend less and less time in the infiltrated network before launching their attack. This is the analysis of the Sophos Active Adversary Report for Tech Leaders 2023. They also need less than a day to access the Active Directory. The majority of ransomware attacks take place outside of business hours. Sophos today releases its Active Adversary Report for Tech Leaders 2023. The report provides a detailed look at attacker behavior and tools in the first half of 2023. On…

Read more

iOS Extraction Toolkit 8 to extract iPhone and iPad
iOS Extraction Toolkit 8 to extract iPhone and iPad

ElcomSoft comes out with a major update of the mobile forensic extraction tool Elcomsoft iOS Forensic Toolkit to extract selected iPhone and iPad models. checkm8-based extraction process enables the most complete extraction, extracting all keychain records regardless of protection class and the entire file system content. The new version 8.0 offers repeatable, verifiable and forensically sound checkm8 extraction for a wide range of Apple devices and features an updated command line driven user interface. Additionally, full passcode unlocking is now available for select older Apple devices. A Mac edition of the tool is currently available, Linux and Windows editions will be available in…

Read more

Forensic tool cracks Windows Hello PIN codes
Forensic tool cracks Windows Hello PIN codes

ElcomSoft cracks Windows Hello PIN codes with its forensics tool and attacks the LUKS2 encryption. This extends the range of forensic password recovery tools to include support for Windows Hello PIN codes on TPM-less computers. There is also support for the new LUKS2 specification for encrypted disks and containers in Linux. Microsoft implements PIN codes as part of Windows Hello authentication and recommends using PIN codes instead of a password. By default, PIN codes contain only digits, but alphanumeric PINs are also possible. While 4- to 6-digit PINs can be cracked in minutes, attacking an alphanumeric PIN…

Read more

Automation of digital forensics and incident response
Automation of digital forensics and incident response

Enhanced FTK Connect increases the power and speed of FTK® solutions with new automation, integration and visualization capabilities. Exterro improves digital forensics and incident response automation with upgrades to FTK® Connect. Exterro, provider of legal GRC software that unifies e-discovery, digital forensics, privacy and cybersecurity compliance, today announces the release of its updated FTK® Connect digital forensics tool. It extends Exterro's industry-leading platform with powerful new automation, orchestration, and integration capabilities. Accelerate investigations The automation of FTK Connect enables companies to speed up the response to incidents or investigations of security breaches. On the other hand offset...

Read more

Can IT forensics protect democracy?

A democracy offers many rights and freedoms to the people who live in it. Guaranteeing and protecting this is the task of the state. Exterro explains how IT forensics can help with digital forensic examinations of data carriers, IT systems and communication links. Smartphones, computers, instant messengers and online services have changed the work of the Office for the Protection of the Constitution, police authorities and other federal and state bodies. In order to protect the free-democratic basic order and to ensure the peaceful coexistence of people, they increasingly need solutions for IT forensics. Exterro, provider of legal GRC software that enables e-discovery, digital forensics, data protection and cybersecurity compliance...

Read more

Tools for IT forensics after cyber attacks
Tools for IT forensics after cyber attacks

Cyber ​​attacks are a daily occurrence for most companies, and it is usually only a matter of time before data security is breached. That's when forensic tools come into their own, helping investigative teams investigate incidents, secure evidence, and initiate countermeasures. There is no such thing as XNUMX% protection against cyber attacks – this is proven, among other things, by the numerous reports of ransomware attacks and data breaches in the news and daily newspapers. It is therefore important for companies to prepare for emergencies and coordinate processes for…

Read more

Worldwide training academy for forensics and data protection

Exterro, provider of legal GRC software that combines e-discovery, digital forensics, data protection and cybersecurity compliance, announces the launch of its new training academy. The Academy offers a combination of one-to-one, live, and on-demand virtual training for Exterro's full range of Legal GRC products. The aim is to train companies in the implementation and use of the software and to continuously train them in the functionalities of the technology. Educating Forensics Experts The Exterro Academy aims to optimize the customer experience and enable companies to realize the full potential of Exterro solutions.

Read more

Forensics: Keys for virtual machines

Elcomsoft opens encrypted virtual machines for law enforcement forensic experts. The new version 4.30 of the Elcomsoft Distributed Password Recovery product supports access to additional encrypted virtual machines. As a result, forensic researchers now have access to data stored in encrypted VMware, Parallels and VirtualBox virtual machines. Additionally, a new rules editor has been added to the UI, allowing users to edit hybrid attack rules directly in the UI. "Virtual machines are very common in the criminal world," explains Andy Malyshev, CEO of ElcomSoft. “By using an encrypted virtual machine, criminals can…

Read more