Today’s huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cyber-crimes.  Computer Forensics is the investigation of computer system that is suspected to being involved in committing criminal activity (or victim of criminal activity). 
Although digital forensics might seem to be a novel discipline, its roots date back to 1970, when engineers recovered the only copy of a database that had been inadvertently deleted.  From such a starting point, digital forensics rapidly evolved. Nowadays, it’s possible to address a variety of aspects concerning digital investigations, for instance, undeleting data or dumping network traffic to reconstruct attacks offline. The standard toolbox used for digital forensics covers all the different aspects of the cyber investigation procedure. 
Disk Forensics (also called File system investigation) is the identification, collection and analysis of the evidence from the storage media. File systems or file management systems is a part of operating system which organize and locate sectors for file storage. , 
Despite its name, Disk Forensics is not limited to hard disks, but it extends to all kinds of storage media such as USB drives, SD cards, etc. Bring us your media, and the Cyberhelix team will check thoroughly your media with various enterprise and custom tools and investigate what has gone wrong.
Databases play an important role in any organization when storage and computing component come into view. Nowadays all activities are performed online and through which lots of sensitive and personal information get stored in the database. 
A forensic examination of a database may relate to the timestamps that apply to the update time of a row in a relational table being inspected and tested for validity in order to verify the actions of a database user. Alternatively, a forensic examination may focus on identifying transactions within a database system or application that indicate evidence of wrongdoing, such as fraud. 
Malware Forensics is a method of finding, analyzing & investigating various properties of malware to find the culprits and reason for the attack. The process also includes tasks such as finding out the malicious code, determining its entry, method of propagation, impact on the system, ports it tries to use etc. investigators conduct forensic investigation using different techniques and tools. 
Malware is a term coined by merging two words – malicious and software, which is used to define a broad range of software that disrupt computer services, steal data, or compromise user safety. It is used to define a range of intrusive and hostile software applications. Malware are software designed for malicious purposes and deliberately cause harm to its target. 
Malware can be classified several ways in order to distinguish the unique types of malware from each other. Distinguishing and classifying different types of malware from each other is important to better understanding how they can infect computers and devices, the threat level they pose and how to protect against them. 
Different malware types exist, however nowadays, malware is often modular and multifaceted, more of a “blended-threat,” with diverse functionality and means of propagation.  A list with the most common ones is presented below , , :
Email forensics is the process of analyzing email contents, header information, transit path for email, sender or receiver information and other details to collect evidence against culprit or to make our system more secure. 
Despite its age, (The history of modern Internet email services reaches back to the early ARPANET, with standards for encoding email messages published as early as 1973 ) email is still the most common form of communication today. 
These two factors make it very attractive to all kinds of cyber-criminals. The European Union Agency for Cyber Security (ENISA) ranks phishing and spamming in the top five threats for 2020. 
Some popular threats in Email communication are:
Traditionally, digital forensics focused on artifacts located on the storage devices of computer systems, mobile phones, digital cameras, and other electronic devices. In the past decade, however, researchers have created a number of powerful memory forensics tools that expand the scope of digital forensics to include the examination of volatile memory as well. 
Memory forensics can provide unique insights into runtime system activity, including open network connections and recently executed commands or processes. In many cases, critical data pertaining to attacks or threats will exist solely in system memory – examples include network connections, account credentials, chat messages, encryption keys, running processes, injected code fragments, and internet history which is non-cacheable. Any program – malicious or otherwise – must be loaded in memory in order to execute, making memory forensics critical for identifying otherwise obfuscated attacks. 
Network forensics is capturing, recording and analysis of network events in order to discover the source of cyber attacks. In network forensics there are two major types of investigation ,  i.e. Network Traffic Analysis & Log Files Analysis.
802.11 (Wi-Fi) based wireless networking has significantly altered the networking means and topology for cities, offices, homes and coffee shops over the last five years. A second generation of wireless devices has extended what was once a computer-to-computer protocol into the area of embedded functional devices. Accompanying this widespread usage is the presence of crime; the more popular technology, the more opportunity exists for its misuse. 
The wireless forensic process involves capturing all data moving over the network and analyzing network events in order to uncover network anomalies, discover the source of security attacks, and investigate breaches on computers and wireless networks to determine whether they are or have been used for illegal or unauthorized activities.
To see the references click on the link above.