Mmm, they smell great! We've baked cookies on our website, and we'd love for you tohave some with us. We use them not only to keep our website working properly, butalso to anonymously analyse data on where you munch on our site. So, would you like some?
A forensic analysis should be performed if you suspect your security has been compromised.
How Do We Proceed?
We analyze the artifacts in the working system
We re-acquire deleted files
We extract malicious software from memory banks, which means we can also uncover sophisticated attempts to conceal it from typical forensic tools
The result of the analysis is a detailed report summarizing the attack’s activities in the applications or systems on the basis of the evidence collected. The acquired information will then allow you to implement the appropriate countermeasures.