4 min readANTI-FORENSICSAnti-Forensics: Using Veracrypt to Hide Your Most Sensitive DataWelcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
3 min readOpen Source Intelligence (OSINT): OSINT Tools for Bitcoin InvestigationsWelcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
6 min readDIGITAL FORENSICSDigital Forensics, Part 8: Live Analysis with sysinternalsWelcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
4 min readNetwork Forensics, Part 5: Wi-Fi (802.11) ForensicsWelcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
4 min readDIGITAL FORENSICSDigital Forensics: Hackers-Arise Uncovers Mastermind of Global Scam!As you know, Hackers-Arise offers a service we call Digital Forensic Investigator for Hire. Most of our cases fit into the following...