c.im is one of the many independent Mastodon servers you can use to participate in the fediverse.
C.IM is a general, mainly English-speaking Mastodon instance.

Server stats:

2.9K
active users

#forensics

12 posts12 participants1 post today
Alonso Caballero / ReYDeS🆓 Webinar Gratuito: "ExifTool para OSINT". Jueves 3 de Abril del 2025. De 4:00pm a 4:45pm (UTC -05:00). Registro libre: https://www.reydes.com/e/eventos #cybersecurity #hacking #readteam #bugbounty #forensics #osint
CyberEthical.Me<p>💣 Full write-up for ToolPie this year's forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.</p><p>🔸 PCAP (network capture) analysis<br>🔸 Python bytecode, marshalling, decompiling</p><p>🔗 <a href="https://blog.cyberethical.me/htb-ctf-2025-forensics-toolpie" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cyberethical.me/htb-ctf-2</span><span class="invisible">025-forensics-toolpie</span></a></p><p><a href="https://infosec.exchange/tags/CyberEthical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberEthical</span></a> <a href="https://infosec.exchange/tags/CyberApocalypse25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberApocalypse25</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> <a href="https://infosec.exchange/tags/wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireshark</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/blueteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteaming</span></a> <a href="https://infosec.exchange/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a> <a href="https://infosec.exchange/tags/dataexfiltration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataexfiltration</span></a></p>
Sajid Nawaz Khan :donor:<p>For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.</p><p>When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).</p><p>While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.</p><p>Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.</p><p>A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.</p><p><a href="https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cobaltstrike.com/blog/cobalt-s</span><span class="invisible">trike-411-shh-beacon-is-sleeping</span></a></p><p><a href="https://infosec.exchange/tags/cobaltstrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cobaltstrike</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
GrrlScientist ⧖ Ⓥ<p>Crime Investigation Tool Reveals Origins Of UK’s Feral Parrots</p><p>"A recent study identified where the UK’s naturalized parakeets came from by adapting a powerful crime investigation technique designed to locate and identify serial criminals"</p><p>by <span class="h-card" translate="no"><a href="https://mastodon.social/@grrlscientist" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grrlscientist</span></a></span> via <a href="https://mastodon.social/tags/Substack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Substack</span></a> </p><p><a href="https://mastodon.social/tags/parrots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parrots</span></a> <a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mastodon.social/tags/parakeets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parakeets</span></a> <a href="https://mastodon.social/tags/London" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>London</span></a> <a href="https://mastodon.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://mastodon.social/tags/SciComm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SciComm</span></a> <a href="https://substack.com/home/post/p-156158357" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">substack.com/home/post/p-15615</span><span class="invisible">8357</span></a></p>
IAintShootinMis<p>My little thread about <a href="https://digitaldarkage.cc/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> Desktop <a href="https://digitaldarkage.cc/tags/memory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memory</span></a> <a href="https://digitaldarkage.cc/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> is jumping in popularity after that @Atlantic article hit the web. </p><p>Need to dig deeper in, if anyone knows how to carve a data segment out of memory for a specific PID using Vol3, that would be super helpful. Just a thought</p><p><a href="https://digitaldarkage.cc/@iaintshootinmis/114198799142386731" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">digitaldarkage.cc/@iaintshooti</span><span class="invisible">nmis/114198799142386731</span></a></p>
GrrlScientist ⧖ Ⓥ :verified:<p>Crime Investigation Tool Reveals Origins Of UK’s Feral Parrots</p><p>"A recent study identified where the UK’s naturalized parakeets came from by adapting a powerful crime investigation technique designed to locate and identify serial criminals"</p><p>by <span class="h-card" translate="no"><a href="https://mstdn.science/@GrrlScientist" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GrrlScientist</span></a></span> via <a href="https://mstdn.science/tags/Substack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Substack</span></a> </p><p><a href="https://mstdn.science/tags/parrots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parrots</span></a> <a href="https://mstdn.science/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mstdn.science/tags/parakeets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parakeets</span></a> <a href="https://mstdn.science/tags/London" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>London</span></a> <a href="https://mstdn.science/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://mstdn.science/tags/SciComm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SciComm</span></a> <a href="https://substack.com/home/post/p-156158357" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">substack.com/home/post/p-15615</span><span class="invisible">8357</span></a></p>
GrrlScientist ⧖ Ⓥ :verified:<p>Crime Investigation Tool Reveals Origins Of UK’s Feral Parrots</p><p>"A recent study identified where the UK’s naturalized parakeets came from by adapting a powerful crime investigation technique designed to locate and identify serial criminals"</p><p>by <span class="h-card" translate="no"><a href="https://mstdn.social/@grrlscientist" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grrlscientist</span></a></span> via <a href="https://mstdn.social/tags/Substack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Substack</span></a> </p><p><a href="https://mstdn.social/tags/parrots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parrots</span></a> <a href="https://mstdn.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mstdn.social/tags/parakeets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parakeets</span></a> <a href="https://mstdn.social/tags/London" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>London</span></a> <a href="https://mstdn.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://mstdn.social/tags/SciComm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SciComm</span></a> <a href="https://substack.com/home/post/p-156158357" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">substack.com/home/post/p-15615</span><span class="invisible">8357</span></a></p>
Calishat<p><a href="https://researchbuzz.masto.host/tags/drugs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>drugs</span></a> <a href="https://researchbuzz.masto.host/tags/fingerprints" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fingerprints</span></a> <a href="https://researchbuzz.masto.host/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> </p><p>'Collecting urine samples, blood or hair are currently the most common ways to detect drug use, but Arizona State University researcher Min Jang may have discovered something better.</p><p>Fingerprints.</p><p>“It is simple and noninvasive,” according to Jang, an assistant professor of forensic chemistry in the School of Interdisciplinary Forensics. “It can be done in 10 seconds.”'</p><p><a href="https://news.asu.edu/20250321-science-and-technology-asu-researcher-points-fingerprints-new-way-detect-drug-use" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.asu.edu/20250321-science-</span><span class="invisible">and-technology-asu-researcher-points-fingerprints-new-way-detect-drug-use</span></a></p>
Alonso Caballero / ReYDeS⭕️ Webinar Gratuito: "ExifTool para OSINT". 🎓 Jueves 3 de Abril del 2025. De 4:00pm a 4:45pm (UTC -05:00). 📲 Registro libre en: https://www.reydes.com/e/eventos #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Vermont Citizen Scientist<p>"There are more things in heaven and earth, Horatio, than are dreamt of in your philosophy" <br>DNA Helps Identify Croatian Nun in Sainthood Quest <a href="https://www.the-scientist.com/dna-helps-identify-croatian-nun-in-sainthood-quest-72784" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">the-scientist.com/dna-helps-id</span><span class="invisible">entify-croatian-nun-in-sainthood-quest-72784</span></a> Not the usual application of forensic evidence, but useful nonetheless <a href="https://sciencemastodon.com/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://sciencemastodon.com/tags/dna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dna</span></a> <a href="https://sciencemastodon.com/tags/identification" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identification</span></a> <a href="https://sciencemastodon.com/tags/burials" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>burials</span></a></p>
Lorry :unverified:<p>Since I am on an IT Security server now, I thought I'd post this just to depress the younger folks. Roll on <a href="https://infosec.exchange/tags/UBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UBI</span></a> !</p><p><a href="https://www.linkedin.com/pulse/ageism-trust-safety-michael-lawrie-msc-ctt/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/pulse/ageism-trus</span><span class="invisible">t-safety-michael-lawrie-msc-ctt/</span></a></p><p><a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/itSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itSecurity</span></a> <a href="https://infosec.exchange/tags/Ageism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ageism</span></a> <a href="https://infosec.exchange/tags/jobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobs</span></a> <a href="https://infosec.exchange/tags/jobsearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobsearch</span></a> <a href="https://infosec.exchange/tags/work" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>work</span></a> <a href="https://infosec.exchange/tags/TrustAndSafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrustAndSafety</span></a> <a href="https://infosec.exchange/tags/moderation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>moderation</span></a> <a href="https://infosec.exchange/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> <a href="https://infosec.exchange/tags/discrimination" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>discrimination</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/Fable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fable</span></a> <a href="https://infosec.exchange/tags/1Password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1Password</span></a> <a href="https://infosec.exchange/tags/Karma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Karma</span></a> <a href="https://infosec.exchange/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> <a href="https://infosec.exchange/tags/Article" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Article</span></a> <a href="https://infosec.exchange/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Cellebrite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cellebrite</span></a> Is Using AI to Summarize Chat Logs &amp; Audio from Seized Mobile Phones</p><p>Cellebrite the company which makes near ubiquitous phone <a href="https://mas.to/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> &amp; <a href="https://mas.to/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> tech used by police officers…has introduced AI capabilities into its products, including summarizing chat logs/audio messages from <a href="https://mas.to/tags/seized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seized</span></a> mobile phones</p><p>The introduction of <a href="https://mas.to/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> into a tool that essentially governs how <a href="https://mas.to/tags/evidence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>evidence</span></a> against criminal defendants is analyzed already has <a href="https://mas.to/tags/CivilLiberties" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CivilLiberties</span></a> experts concerned</p><p><a href="https://www.404media.co/cellebrite-is-using-ai-to-summarize-chat-logs-and-audio-from-seized-mobile-phones/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/cellebrite-is-usin</span><span class="invisible">g-ai-to-summarize-chat-logs-and-audio-from-seized-mobile-phones/</span></a></p>
Laurent Cheylus<p>Quelles sont les possibilités d'extraire des données de la mémoire d'un smartphone, particulièrement avec les méthodes de chiffrement actuelles ? - Article de Jean-Marc Manach <span class="h-card"><a href="https://infosec.exchange/@manhack" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>manhack</span></a></span> illustré par une thèse récente d'une chercheuse japonaise <a href="https://bsd.network/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a> <a href="https://next.ink/157289/les-vulnerabilites-materielles-et-logicielles-des-memoires-chiffrees-que-tentent-de-hacker-les-cryptanalystes/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">next.ink/157289/les-vulnerabil</span><span class="invisible">ites-materielles-et-logicielles-des-memoires-chiffrees-que-tentent-de-hacker-les-cryptanalystes/</span></a></p>
proedie<p><a href="https://mastodon.green/tags/TIL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TIL</span></a>: <a href="https://mastodon.green/tags/Optography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Optography</span></a> actually works!</p><p>An <a href="https://mastodon.green/tags/optogram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>optogram</span></a> is an image of the retina that shows the last thing the eye has ever seen – for example the face of one’s <a href="https://mastodon.green/tags/murderer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>murderer</span></a>. I always thought it was a myth, but, no, it’s actually a thing.</p><p>The only reason why it doesn’t work as a tool in <a href="https://mastodon.green/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> is the fact that you have to take a <a href="https://mastodon.green/tags/murder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>murder</span></a> victim’s optogram so quickly after their death that the ‘optographer’ would have been an eye witness anyway.</p><p><a href="https://mastodon.green/tags/crime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crime</span></a> <a href="https://mastodon.green/tags/investigation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>investigation</span></a></p>
Alonso Caballero / ReYDeS🟥 Curso Hacking Kali Linux 2025. 💻 Domingos 2, 9, 16, 23 de Marzo. De 9:00 am a 12:00 pm (UTC -05:00). 📵 Más información (PDF): https://www.reydes.com/archivos/cursos/Curso_Hacking_Kali_Linux.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS🧑‍💻 Curso Hacking Kali Linux 2025. ⏰ Domingos 2, 9, 16, 23 de Marzo. De 9:00 am a 12:00 pm (UTC -05:00). 🔎 Más información: https://www.reydes.com/e/Curso_de_Hacking_con_Kali_Linux 📲 WhatsApp: https://wa.me/51949304030 #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Walker<p>The one downside of being a forensics analyst is handling user workstations / laptops.</p><p>OH MY GOD PEOPLE ARE DISGUSTING!</p><p>Take a moment and look at your laptop / keyboard. How clean it is really?</p><p>Need to get the gloves. </p><p><a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/ftkimager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ftkimager</span></a></p>
earthling<p>File System Forensics by Fergus Toolan, 2025</p><p>Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systems. File System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/nonfiction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nonfiction</span></a> <br><a href="https://mastodon.social/tags/computers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computers</span></a> <br><a href="https://mastodon.social/tags/FileSystems" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FileSystems</span></a> <br><a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a></p>
Alonso Caballero / ReYDeS⏺️ Curso Hacking Kali Linux 2025. 🗓️ Domingos 2, 9, 16, 23 de Marzo. De 9:00 am a 12:00 pm (UTC -05:00). 📂 Más información (PDF): https://www.reydes.com/archivos/cursos/Curso_Hacking_Kali_Linux.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Ichinin :verified: :verified_paw: ✅🎯🙄<p>Anyone interested in Starting a DFIR company, based in Stockholm Sweden? <a href="https://infosec.exchange/tags/WFH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WFH</span></a> <a href="https://infosec.exchange/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7299878984371077120/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/feed/update/urn:l</span><span class="invisible">i:activity:7299878984371077120/</span></a></p>