A blog about enhancing operational resilience in OT
A blog about enhancing operational resilience in OT
In March 2024, the online games community Mr. Green Gaming suffered a data breach that exposed 27k user records. Acknowledged on their Discord server, the incident exposed email and IP addresses, usernames, geographic locations and dates of birth.
An overwhelming amount of forensic information is tied up in the Google LevelDB format and is being missed by forensic examiners. This includes numerous databases present in Chromium-based browsers and a massive amount of data sitting behind Electron-based applications. Open-source support for LevelDB analysis is sparse, but some vendors are starting to incorporate capabilities within their tool suites. In this post, we use the new Arsenal Recon LevelDB Recon tool to examine the Chrome Platform Notifications database extracting a surprising amount of information, including over six months of calendar reminders. If you have not been paying attention to LevelDB artifacts let this short post be your wake-up call!
Master cloud security by tackling this free series of workshops.
It’s likely AI will become ubiquitous, which means CISOs must know how to manage, guide, and lead AI’s adoption.
In February 2024, the AI-powered visual design platform Cutout.Pro suffered a data breach that exposed 20M records. The data included email and IP addresses, names and salted MD5 password hashes which were subsequently broadly distributed on a popular hacking forum and Telegram channels.
In February 2024, the Australian Telco Tangerine suffered a data breach that exposed over 200k customer records. Attributed to a legacy customer database, the data included physical and email addresses, names, phone numbers and dates of birth. Whilst the Tangerine login process involves sending a one-time password after entering an email address and phone number, it previously used a traditional password which was also exposed as a bcrypt hash.
What is computer forensics (cyber forensics)? Computer forensics is the application of investigation and analysis techniques to gather and preserve […]