yara as a tool for attribution

2024-08-20

yara can be used as a tool to attribute malware or threat actors.

When analyzing malware, be on the lookout for certain types of strings that may be ...

Read More

artifact

2024-08-19

An artifact in the context of digital forensics is any information stored on a system that provides insight into how it was used.

Read More

automation

2024-08-19

Automation is the use of technology to perform tasks, often at scale, with reduced human assistance.

Read More

consent

2024-08-19

Consent is mutually agreed-upon activity.

Read More

CPU

2024-08-19

A Central Processing Unit (CPU), often referred to simply as a “processor” is a hardware component of a computer responsible for carrying ...

Read More

deception

2024-08-19

Deception is the act of convincing others of untrue information.

Read More

Emacs

2024-08-19

Emacs (short for Editor MACroS) is a family of extensible text editors.

https://en.wikipedia.org/wiki/Emacs

Read More

filesystem

2024-08-19

A filesystem (FS) is a structure used by an operating system used to organize and manage files on a storage device.

Read More

intelligence agency

2024-08-19

An intelligence agency is a government agency responsible for collection, analysis, and exploitation of information in support of national security, ...

Read More

IRIX

2024-08-19

IRIX is a discontinued operating system developed by Silicon Graphics Inc. (SGI) that runs on their own proprietary MIPS computers. ...

Read More