Adobe ColdFusion is a commercial web application development software created by JJ Allaire in 1995. The…
Knowing the common web vulnerabilities is great, but often it is hard to think of specific examples that appear in popular news to show the layman the relevance of these issues.
Memory Forensics is the analysis of a computer’s memory. This is a fast growing area of…
Introduction
Timeline analysis is helpful for many types of investigations and is frequently used to answer questions about activities that happened before or after a given event. I typically use log2timeline or…
Before we get started, I would like to a moment to thank Chris Pogue, CISO at Nuix, to allow us to…
Penetration testing is an authorized simulation of an attack on a system, network, or application to find…
For a lot of people, information security in an organization all happens under the hood. At the user-level there may be distinguishable common practices like looking for signs of phishing, securing accounts with strong…
These were the top 10 stories published by Horangi; you can also dive into yearly archives: 2017, 2018.