You probably either heard about Ransomware programs that encrypt user files and then ask to transfer money.
Michael Gough, a local “Malware Archeologist” published a blog post about using Splunk.
Koen Van Impe puplished an interesting post in his blog about analysis of proxy server logs.
Apple users were quick to update their devices to iOS 10. In fact, they were quicker to update than with any previous release. Within one month, two-thirds of iOS devices were updated.
Web – site NirSoft provides a unique collection of small and useful free utilities, all of them developed by Nir Sofer.
Travis Foley has written a nice tool that is really helpful for Windows based incident response. All you need to start collecting valuable info is to place dfirtriage.exe and core.ir in the same directory on the target and execute dfirtriage.exe with admin rights.
Raph Broenink wrote the “image mounter” tool. Ralph is still very active in this tool’s development. “Image mounter” tool designed to deploy as a Linux base system or OSX.