mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.1K
active users

ECS Infotech Pvt. Ltd.<p>Discover how chip-off forensics turns damaged devices into powerful sources of digital evidence — crucial for investigations &amp; legal battles. ⚡💾</p><p>Read more 👉 <a href="https://www.ecsinfotech.com/case-study/from-dead-device-to-digital-evidence-chip-off-forensics-in-action/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ecsinfotech.com/case-study/fro</span><span class="invisible">m-dead-device-to-digital-evidence-chip-off-forensics-in-action/</span></a></p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ChipOffForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChipOffForensics</span></a> <a href="https://infosec.exchange/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://infosec.exchange/tags/DataRecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataRecovery</span></a> <a href="https://infosec.exchange/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a> <a href="https://infosec.exchange/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZDigital Forensics in Cyber Security: Real-World Applications Digital forensics is the process of investigating cybercrimes by retrieving and examining data from computers, smartphones, storage… C...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity-training" target="_blank">#cybersecurity-training</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/digital-forensic-tools" target="_blank">#digital-forensic-tools</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/education" target="_blank">#education</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/digital-forensics" target="_blank">#digital-forensics</a><br><br><a href="https://medium.com/@cyber-security-courses/digital-forensics-in-cyber-security-real-world-applications-c1ba4d5c7a51?source=rss------education-5" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=NMxjxwMnd5D3JY8HfHjngh6BwYq&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Alexis Brignoni :python: :donor:<p>Good work requires time. And time requires planning and careful scheduling.<br>Results will be as good as the direction, time available, and evidence completeness allow us.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Andrea Lazzarotto<p>Una donna londinese è stata rimborsata da <a href="https://mastodon.social/tags/Airbnb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Airbnb</span></a> dopo che un proprietario di appartamenti di New York l'aveva accusata di aver provocato danni per 12000 sterline.</p><p>Le foto erano state generate con strumenti di <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>.</p><p><a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://mastodon.social/tags/Multimedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Multimedia</span></a></p><p><a href="https://www.theguardian.com/technology/2025/aug/02/airbnb-guest-damage-claim-refund-photos" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theguardian.com/technology/202</span><span class="invisible">5/aug/02/airbnb-guest-damage-claim-refund-photos</span></a></p>
The DFIR Report<p>🚨 Search for software, end up getting ransomware!</p><p>The DFIR Report has observed SEO driven <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> malware campaigns occurring over the month of July. This initial access lead to full domain compromise, data exfiltration, and deployment of Akira Ransomware.</p><p>🧅 Attack Chain</p><p>Search for IT software in search engine &gt; Click SEO hijacking domain &gt; Download Trojaned installer MSI &gt; Installer executes Bumblebee Malware</p><p>🛠️ Other Tools Dropped</p><p>AdaptixC2 - Command and Control</p><p>Netscan - Discovery</p><p>🔍 Additional Discovery</p><p>Windows Uiltities - systeminfo, nltest, whoami, net</p><p>⚙️ Persistence &amp; Privilege Escalation</p><p>Created domain user accounts and added to "Enterprise Administrators"</p><p>⬆️ Exfiltration</p><p>SFTP via Filezilla</p><p>💀 Impact</p><p>Akira Ransomware</p><p>📖 Full Report:</p><p><a href="https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedfirreport.com/2025/08/05/f</span><span class="invisible">rom-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/CyberThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreatIntel</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a></p>
brettshavers<p>Upcoming Webinar: "Every Seat Except the Judge's".</p><p>I sat in 14 different seats in 10 different legal cases. I'll share what I learned in how each role looks at YOU, the DF/IR practitioner.</p><p>August 7, 2025. 11AM MT<br>Free. Plus giving away 3 copies of DFIR Investigative Mindset book (free USA shipping!). </p><p><a href="https://www.suspectbehindthekeyboard.com/offers/UJ2LLPon/checkout" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">suspectbehindthekeyboard.com/o</span><span class="invisible">ffers/UJ2LLPon/checkout</span></a><br><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/webinar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webinar</span></a></p>
Tedi Heriyanto<p>Hex Editors: How to Use Them Effectively: <a href="https://matthewplascencia.substack.com/p/hex-editors-how-to-use-them-effectively" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">matthewplascencia.substack.com</span><span class="invisible">/p/hex-editors-how-to-use-them-effectively</span></a></p><p><a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/hexeditor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hexeditor</span></a></p>
Alexis Brignoni :python: :donor:<p>Which one are you?</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>🌋 The LEAPPs Artifact Viewer App (LAVA) is right around the corner.<br>🌋 Learn how to build artifacts for the LEAPPs that will work with LAVA.<br>🌋 Watch the video tutorial here: <a href="https://www.youtube.com/live/qTgZUh4GPxk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/live/qTgZUh4GPxk</span><span class="invisible"></span></a>?</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/LAVA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LAVA</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/Coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coding</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> open-sources <a href="https://mastodon.thenewoil.org/tags/Thorium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Thorium</span></a> platform for <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>, <a href="https://mastodon.thenewoil.org/tags/forensic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensic</span></a> analysis</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.thenewoil.org/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
#Digital ⚓️ #Vagabond 🦈<p>Digital Preservation in Popular Culture: Elementary S05E07</p><p>"I managed to isolate the serial number of Mr Trenchman's new camera from the metadata hidden in his YouTube footage"</p><p>NB. couldn't find a better resolution to get a better pic of the video codec! </p><p><a href="https://digipres.club/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://digipres.club/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://digipres.club/tags/Digipres" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Digipres</span></a> <a href="https://digipres.club/tags/Codecs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Codecs</span></a> <a href="https://digipres.club/tags/Elementary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Elementary</span></a> <a href="https://digipres.club/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZHow I Stay Current with Incident Response Best Practices Continue reading on Medium » <br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cyber-security-awareness" target="_blank">#cyber-security-awareness</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/information-security" target="_blank">#information-security</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/education" target="_blank">#education</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/digital-forensics" target="_blank">#digital-forensics</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a><br><br><a href="https://medium.com/@beturaniza/how-i-stay-current-with-incident-response-best-practices-99954de6d09b?source=rss------education-5" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=1yUElZyDTwXqpXwAAJujMQXtZUO&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Forensic Focus<p>Dr Zoe Billings and Mark Pannone from Adapt &amp; Evolve join the Forensic Focus Podcast to discuss their unique approach to mental health and well-being in digital forensics. <a href="https://www.forensicfocus.com/podcast/digital-forensics-and-stress-understanding-your-bodys-signals/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forensicfocus.com/podcast/digi</span><span class="invisible">tal-forensics-and-stress-understanding-your-bodys-signals/</span></a> <a href="https://dfir.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://dfir.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://dfir.social/tags/WellBeing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WellBeing</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Volatility 3 rebuilds memory forensics with a modular, Python-based architecture. It supports multiple operating systems, extends functionality with plugins, and simplifies analysis in incident response scenarios. <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MemoryAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemoryAnalysis</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/volatilityfoundation/volatility3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/volatilityfoundatio</span><span class="invisible">n/volatility3</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
TechNadu<p>💻 Threat Intel: FMovies Pirate Site Delivered Infostealers at Scale<br>Recent analysis links FMovies to a massive infostealer malware campaign:</p><p>• 30K infections (Lumma, StealC, Vidar, RedLine, Raccoon)<br>• Methods: Cookie theft, JS-injected ads, fake video buttons<br>• Over 15K affected users, 10K+ leaked credentials<br>• Only 12.9% of passwords are classified as strong<br>• Source: Hudson Rock via Microsoft + TorrentFreak</p><p>The platform shut down in August 2024, but infected cookies are still being traded.</p><p>🔗 Read full intel: ⬇️ <br><a href="https://technadu.com/fmovies-pirate-website-linked-to-global-infostealer-activity/603547/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">technadu.com/fmovies-pirate-we</span><span class="invisible">bsite-linked-to-global-infostealer-activity/603547/</span></a></p><p><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/Infostealers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infostealers</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/Malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malvertising</span></a> <a href="https://infosec.exchange/tags/HudsonRock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HudsonRock</span></a></p>
Alexis Brignoni :python: :donor:<p>You got me...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Loki the Cat<p>Gmail's secret IP tracking just cracked a murder case wide open - the 'victim's' email came from the suspect's hotel, not her location. $23.2M verdict but he's free due to extradition issues. Moral: Your digital footprints are forever, but justice has borders. 💻🌍</p><p><a href="https://yro.slashdot.org/story/25/07/20/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/07/2</span><span class="invisible">0/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death</span></a></p><p><a href="https://toot.community/tags/Gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gmail</span></a> <a href="https://toot.community/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://toot.community/tags/WrongfulDeath" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WrongfulDeath</span></a></p>
Pen Test Partners<p>Can AI help you examine leaked data safely?<br>If you do it right, it can...</p><p>In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.</p><p>He shows how AI can help find important information in big datasets and speed up analysis.</p><p>📌Read here: <a href="https://www.pentestpartners.com/security-blog/using-ai-chatbots-to-examine-leaked-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/using-ai-chatbots-to-examine-leaked-data/</span></a></p><p>To make sure the AI output is correct, it should always be checked against the raw dataset.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
Alexis Brignoni :python: :donor:<p>It's us...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a></p>
404Not Found