yara as a tool for attribution
2024-08-20
yara can be used as a tool to attribute malware or threat actors.
When analyzing malware, be on the lookout for certain types of strings that may be ...
Read More
artifact
2024-08-19
An artifact in the context of digital forensics is any information stored on a system that provides insight into how it was used.
Read More
automation
2024-08-19
Automation is the use of technology to perform tasks, often at scale, with reduced human assistance.
Read More
consent
2024-08-19
Consent is mutually agreed-upon activity.
Read More
CPU
2024-08-19
A Central Processing Unit (CPU), often referred to simply as a “processor” is a hardware component of a computer responsible for carrying ...
Read More
deception
2024-08-19
Deception is the act of convincing others of untrue information.
Read More
Emacs
2024-08-19
Emacs (short for Editor MACroS) is a family of extensible text editors.
https://en.wikipedia.org/wiki/Emacs
Read More
filesystem
2024-08-19
A filesystem (FS) is a structure used by an operating system used to organize and manage files on a storage device.
Read More
intelligence agency
2024-08-19
An intelligence agency is a government agency responsible for collection, analysis, and exploitation of information in support of national security, ...
Read More
IRIX
2024-08-19
IRIX is a discontinued operating system developed by Silicon Graphics Inc. (SGI) that runs on their own proprietary MIPS computers. ...
Read More