News
Wiz researchers discovered NVIDIAScape, an Nvidia Container Toolkit flaw that can be exploited for full control of the host ...
Security researchers at Lookout Threat Lab, a leading mobile security research organization, have identified a mobile forensics tool called Massistant that is being used by Chinese law enforcement ...
Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and ...
Researchers warned that Chinese residents, and visitors to China, should be aware of the tool's existence and the risks it ...
Designed specifically for Africa, this toolkit provides a roadmap for establishing and strengthening Computer Emergency Response Teams (CERTs) – essential frontline institutions in our collective ...
THOR Lite is a free, signature-based incident response scanner using YARA, Sigma, and known IOCs to detect threats and anomalies on Windows, Linux, and macOS systems. - Pull requests · kh4sh3i/THOR ...
This paper examines different types of computer crimes such as hacking, fraud, financial crimes, spreading of viruses and malware, cyber terrorism, and denial of services. Furthermore, it discusses ...
Learn what live analysis and dead analysis are, how they differ, and what are their advantages and disadvantages in operating system forensics.
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results