
Cyber Forensics 4 ALL is an online cloud-based education platform that aims to enhance students’ learning experience in the field of Computer Forensics and Digital Evidence. Our goal is to educate students on the nuances of this field while making the learning experience better. By simulating well-known, real-world incidents involving criminal activity and the accompanying cyber investigations, we have provided case studies that will provide a contextual-based, online-learning environment. We also strive to help the law enforcement study the incidents and provide more efficient ways to carry out the forensic investigations.

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
May 17, 2025
FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S. officials. The FBI warns that ex-government officials are being targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials. The FBI warns of a campaign using smishing and vishing with deepfake texts and AI voice messages impersonating senior […]
Read Full Article
Shields up US retailers. Scattered Spider threat actors can target them
May 17, 2025
Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting U.S. companies, shifting their focus across the Atlantic. The financially motivated group UNC3944 (also known as Scattered Spider, 0ktapus) is known for social engineering and extortion. The cybercrime group is suspected of hacking into hundreds of organizations over the past two years, […]
Read Full Article
U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog
May 17, 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the descriptions for these flaws: According to Binding Operational […]
Read Full Article
Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi
May 16, 2025
On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint, ESXi, VirtualBox, RHEL, and Firefox. On day two of Pwn2Own Berlin 2025, bug hunters earned a total of $435,000, which brings the contest total to $695,000, after $260,000 was awarded during the first day of the competition. The participants demonstrated […]
Read Full ArticleHello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what kind of companies are hiring interns and what the process...
By AP Malla, 1 year ago