Найти в Дзене
Research

Research

The Research category focuses on original studies, experiments, in-depth investigations and other findings of the author. This category provides comprehensive reports and findings that contribute to the broader understanding of cybersecurity issues.
подборка · 5 материалов
11 месяцев назад
Hacking the Hippocratic Oath. Forensic Fun with Medical IoT
this document provides a comprehensive analysis of Medical Internet of Things (IoMT) Forensics, focusing on various critical aspects relevant to the field, including examination of current forensic methodologies tailored for IoT environments, highlighting their adaptability and effectiveness in medical contexts; techniques for acquiring digital evidence from medical IoT devices, considering the unique challenges posed by these devices; exploration of privacy issues and security vulnerabilities inherent...
11 месяцев назад
Leveraging Energy Consumption Patterns for Cyberattack Detection in IoT Systems
This document provides a comprehensive analysis of the energy consumption of smart devices during cyberattacks, focusing on various aspects critical to understanding and mitigating these threats: types of cyberattacks, detection techniques, benefits and drawbacks, applicability across industries, integration options. This qualitative analysis provides valuable insights for cybersecurity professionals, IoT specialists, and industry stakeholders. The analysis is beneficial for enhancing the security...
1 год назад
When Velociraptors Meet VMs. A Forensic Fairytale
Welcome to the riveting world of forensic analysis on VMware ESXi environments using Velociraptor, the tool that promises to make your life just a tad bit easier. Velociraptor, with its advanced forensic techniques, is tailored to the complexities of virtualized server infrastructures. It’s like having a Swiss Army knife for your forensic needs, minus the actual knife. Whether you’re dealing with data extraction, log analysis, or identifying malicious activities, Velociraptor has got you covered...
1 год назад
Bias in AI. Because Even Robots Can Be Sexist
The intersection of gender and cybersecurity is an emerging field that highlights the differentiated impacts and risks faced by individuals based on their gender identities. Traditional cybersecurity models often overlook gender-specific threats such as online harassment, doxing, and technology-enabled abuse, leading to inadequate protection for vulnerable groups. This paper explores the integration of human-centric and gender-based threat models in cybersecurity, emphasizing the need for inclusive and equitable approaches...
1 год назад
Fuxnet
Unpacking with more detail: check source This time, we’re diving into the murky waters of the Fuxnet malware, a brainchild of the illustrious Blackjack hacking group. Let’s set the scene: Moscow, a city unsuspectingly going about its business, unaware that it’s about to be the star of Blackjack’s latest production. The method? Oh, nothing too fancy, just the classic “let’s potentially disable sensor-gateways” move. In a move of unparalleled transparency, Blackjack decides to broadcast their cyber conquests on ruexfil...