Linux Magazine<p>From this week's Linux Update newsletter, Chris Binnie explores techniques for Digital Forensics and Incident Response to assess the damage after an attack<br /><a href="https://www.linux-magazine.com/index.php/Issues/2024/286/Digital-Forensics-and-Incident-Response" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/index.php/I</span><span class="invisible">ssues/2024/286/Digital-Forensics-and-Incident-Response</span></a><br /><a href="https://fosstodon.org/tags/DFIR" class="mention hashtag" rel="tag">#<span>DFIR</span></a> <a href="https://fosstodon.org/tags/attack" class="mention hashtag" rel="tag">#<span>attack</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/REMnux" class="mention hashtag" rel="tag">#<span>REMnux</span></a> <a href="https://fosstodon.org/tags/TsurugiLinux" class="mention hashtag" rel="tag">#<span>TsurugiLinux</span></a> <a href="https://fosstodon.org/tags/OSINT" class="mention hashtag" rel="tag">#<span>OSINT</span></a></p>