<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3026858&amp;fmt=gif">

Enterprise Forensics Blog

How to perform compromise assessment with 1 click?

Compromise assessment is an analysis of a network of endpoints or a single endpoint to uncover unknown security breaches, malware, and any sign of unauthorized access. The assessment seeks to discover any present and past attacker traces in the...

Microsoft Exchange Server Vulnerability Scanner (CVE-2021-42321)

UPDATE 15.11.2021.

Microsoft patches actively exploited Exchange, Excel zero-days (CVE-2021-42321). Please refer to their site for more details. 

...

The Tenth Step to Forensic Readiness: Legal review

When we plan our incident response strategies and forensic readiness steps, we strongly pay attention to digital evidence acquisition, storage,...

The Ninth Step to Forensic Readiness: Incident response documents and reporting

The purpose of an investigation is never just to find the source of damage and place a quick repair. An investigation is in place to find out how...

Binalyze joins forces with EU’s ECHO Network Project to strengthen the proactive cyber defense of the EU

Binalyze is delighted to announce we are joining the EU’s ECHO Network project as a vendor, making us the first Digital Forensics and Incident...

August 2021 Binalyze Product Updates

Welcome to our monthly product updates roundup! Here’s a rundown of the new features and solutions we released in the past month that you can now...

The Eight Step to Forensic Readiness: Incident Response Training & Awareness

The end goal of this step is to ensure that internal training & awareness programs take place within your organization since your employees may be...

The Seventh Step to Forensic Readiness: When a full formal investigation should be launched?

There can be many kinds of suspicious events generated either by the system or by human watchfulness. Every suspicious event (as described in step...

Reducing Digital Investigation Cost With DRONE

According to McAfee’s latest report (The Hidden Costs of Cybercrime), the cost and damage of cyber-attacks can rise significantly if not resolved...

Is it time to change the old DFIR practices?

A few days ago, I had an interesting discussion with Archan Choudhuryabout digital forensics practices. Archan is the Lead Cloud Security Incident...