The Rise of Medusa Ransomware: What Students and Organizations Need to Know

The Rise of Medusa Ransomware: What Students and Organizations Need to Know Introduction Cybersecurity students and professionals were recently alerted to a growing threat: the Medusa ransomware group is actively targeting Gmail, Outlook, and organizations across multiple critical infrastructure sectors. According to reports from the FBI and private threat intelligence firms, Medusa has evolved into a highly capable ransomware-as-a-service (RaaS) platform that enables affiliates to launch disruptive and damaging attacks. ...

Digital Forensics & Incident Response Lab

Digital Forensics & Incident Response Lab Overview In this hands-on lab, you will learn how to analyze digital evidence, extract forensic artifacts, and reconstruct cyber incidents. You will work with disk and memory forensics, system logs, and forensic timelines to investigate potential security breaches. Lab Instructions 1. Setting Up Your Environment You will need: A Debian-based forensic workstation (Kali Linux, SIFT Workstation, or REMnux) Tools: Autopsy, Sleuth Kit, Volatility, Plaso, log2timeline Install Required Tools sudo apt update && sudo apt install autopsy sleuthkit volatility plaso 2. Disk Forensics with Autopsy & Sleuth Kit Step 1: Acquire an Image Download a sample forensic image (e.g., evidence.dd): ...