47 Followers
13 Following
2K Posts
"Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild"
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected web… https://ift.tt/HDMOsbS
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites.

WIRED

"Mac Imaging Made Easy with Fuji"
🎉 New for 2026!

In this episode, we’ll look at Fuji — a free, open-source tool for performing live, logical forensic acquisitions of Mac computers (Intel or Apple Silicon). You’ll see how Fuji leverages built-in macOS … https://www.youtube.com/watch?v=9ZkLdFodhzM

Mac Imaging Made Easy with Fuji

YouTube

"A Study in DFIR: Open-Source, Enterprise, and the Art of Analysis"

Someone asked me recently how I see DFIR evolving — tooling, automation, and open-source versus enterprise platforms. It’s the kind of question that sounds like a conference panel topic… https://ift.tt/vOJxAUK

A Study in DFIR: Open-Source, Enterprise, and the Art of Analysis

Someone asked me recently how I see DFIR evolving — tooling, automation, and open-source versus enterprise platforms. It’s the kind of question that sounds like a conference panel topic, but …

Baker Street Forensics

"Looks Can Lie: Is That Really an NVMe Drive?"

Many storage devices and adapter boards look alike. When holding a module with a connector that looks suspiciously like the M.2, how do you know exactly what you are dealing with? Is that M.2 board a SATA d… https://ift.tt/N0ifpSb

Looks Can Lie: Is That Really an NVMe Drive? | ElcomSoft blog

"What Is Cyber Warfare? Definition, Doctrine, and Real-World Examples"

Cyber warfare has become a defining feature of geopolitical competition in the digital age. Governments now rely on cyber operations to gather intelligence, disrupt adversaries, and … https://ift.tt/R7bqLkg

What Is Cyber Warfare? Definition, Doctrine, and Real-World Examples - Cyberwarzone

Cyber warfare refers to the use of digital operations by states or state-aligned actors to achieve strategic objectives against an adversary. These operations can involve espionage, disruption, psychological influence, or the degradation of critical infrastructure.

Cyberwarzone

"Stuxnet: The Cyber Weapon That Changed Warfare"

In 2010, security researchers uncovered a malware operation that changed the history of cyber conflict. MITRE ATT&CK still describes Stuxnet as the first publicly reported malware built specifically to ta… https://ift.tt/LY36V4n

Stuxnet: The Cyber Weapon That Changed Warfare - Cyberwarzone

Stuxnet was the first publicly known cyber weapon to cause physical damage inside critical infrastructure, reshaping how governments, defenders, and analysts understand cyber warfare, industrial sabotage, and state power in cyberspace.

Cyberwarzone

"What Are Passkeys? How They Work, Why They Matter, and When to Use Them"

Passkeys are one of the most important changes in consumer authentication in years. They are designed to replace or sharply reduce password use by letting people sign in with the … https://ift.tt/mBNQLp3

What Are Passkeys? How They Work, Why They Matter, and When to Use Them - Cyberwarzone

Passkeys are a phishing-resistant sign-in method built on public-key cryptography and the FIDO/WebAuthn ecosystem. This practical guide explains how passkeys work, where they improve security over passwords and SMS codes, what their limits are, and how to start using them safely.

Cyberwarzone

"xLEAPP - Helper scripts for pulling/cloning and creation of Windows exe"

Hey there,

I was asked if there is an easy way to have the latest xLEAPP (ALEAPP and iLEAPP) version on Windows with all the most recent parsers from the main repositories.

I cr… https://ift.tt/bn43EFN

xLEAPP - Helper scripts for pulling/cloning and creation of Windows exe

This is my blog about topics in the field of digital forensics.

"Android Pre-Installed Apps: What Could Possibly Go Wrong?"

Picture this: you just dropped $1,300 on a brand-new, top-of-the-line Android flagship. You unbox it, peel off the plastic film, boot it up, and get ready for the daily grind. But before you ca… https://ift.tt/ivPawz6

Android Pre-Installed Apps: What Could Possibly Go Wrong? | ElcomSoft blog

"KMLer: a CSV / XLSX to KML Tool"

Tool output point and horizontal accuracy depicted through Google Earth.

KMLer – a free-to-use CSV / XLSX to KML tool! KMLer supports point files, Horizontal Accuracy visualization, and easy Extended Data selection.

L… https://ift.tt/GMkhm87

KMLer: a CSV / XLSX to KML Tool

This free tool converts CSV to KML. KMLer supports both point files, Horizontal Accuracy visualization, and easy Extended Data selection.

The Metadata Perspective