{"id":1238,"date":"2024-02-10T21:41:23","date_gmt":"2024-02-10T14:41:23","guid":{"rendered":"https:\/\/staging.e5h.co.uk\/?page_id=1238"},"modified":"2026-01-07T03:16:43","modified_gmt":"2026-01-07T03:16:43","slug":"downloads","status":"publish","type":"page","link":"https:\/\/icmscyber.com\/th\/downloads\/","title":{"rendered":"\u0e14\u0e32\u0e27\u0e19\u0e4c\u0e42\u0e2b\u0e25\u0e14"},"content":{"rendered":"<div class=\"section-wrapper\" data-id=\"FYpthm\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-FYpthm layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Dc7miV\"><div class=\"guten-column-wrapper\" data-id=\"Dc7miV\">\n<h2 class=\"wp-block-heading\">\u0e14\u0e32\u0e27\u0e19\u0e4c\u0e42\u0e2b\u0e25\u0e14<\/h2>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"guten-element guten-spacer guten-2ECUnv\"><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"VTqZXz\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-VTqZXz layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-x9LSlc animated guten-element-hide desktop-slideInDown\"><div class=\"guten-column-wrapper\" data-id=\"x9LSlc\">\n<h6 class=\"wp-block-heading has-text-align-center has-tiny-font-size\">Download Brochures<\/h6>\n\n\n\n<div class=\"guten-element guten-buttons-wrapper\"><div class=\"guten-element guten-buttons horizontal guten-BLWakF guten-buttons horizontal guten-BLWakF\">\n<div class=\"guten-element guten-button-wrapper guten-1B241x\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/Digital-Forensics-Incident-Response-Services.pdf\" aria-label=\"\"><span><em>\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e15\u0e23\u0e27\u0e08\u0e1e\u0e34\u0e2a\u0e39\u0e08\u0e19\u0e4c\u0e2b\u0e25\u0e31\u0e01\u0e10\u0e32\u0e19\u0e17\u0e32\u0e07\u0e14\u0e34\u0e08\u0e34\u0e17\u0e31\u0e25<\/em><\/span><\/a><\/div>\n\n\n\n<div class=\"guten-element guten-button-wrapper guten-7YvLl7\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/ICMS-Training-Services.pdf\" aria-label=\"\"><span><em>Training Services<\/em>   <\/span><\/a><\/div>\n\n\n\n<div class=\"guten-element guten-button-wrapper guten-9sxs2M\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/06\/ThreatTrace360-Brochure-TH.pdf\" aria-label=\"\"><span><em>ThreatTrace360<\/em>&#8211;<em>Th<\/em>  <\/span><\/a><\/div>\n\n\n\n<div class=\"guten-element guten-button-wrapper guten-eLlAqj\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/06\/ThreatTrace360-Brochure-EN.pdf\" aria-label=\"\"><span><em>ThreatTrace360<\/em>&#8211;<em>EN<\/em><\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-aGDLt4 animated guten-element-hide desktop-fadeInDown\"><div class=\"guten-column-wrapper\" data-id=\"aGDLt4\">\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-Pk3AWH\"><div class=\"guten-image-wrapper\"><img decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/tech-news-1.jpg\" height=\"288\" width=\"512\"\/><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u0e1a\u0e17\u0e04\u0e27\u0e32\u0e21\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c (Cybersecurity)<\/h3>\n\n\n\n<p class=\"translation-block\">Welcome to our collection of&nbsp;<strong>free cybersecurity articles<\/strong>! These articles provide valuable insights, practical tips, and up-to-date knowledge on digital forensics, incident response and the latest cybersecurity trends. Feel free to explore and download the following resources.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-w2OKJa animated guten-element-hide desktop-slideInDown\"><div class=\"guten-column-wrapper\" data-id=\"w2OKJa\">\n<h6 class=\"wp-block-heading\"><a href=\"https:\/\/icmscyber.com\/th\/software\/\" title=\"Software\">Download Free Forensic Software<\/a><\/h6>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"guten-element guten-spacer guten-0Ip6Iz\"><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"yTdIOX\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-yTdIOX layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ZJQMsB\"><div class=\"guten-column-wrapper\" data-id=\"ZJQMsB\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-yd9qCP\"><div class=\"guten-column-wrapper\" data-id=\"yd9qCP\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Wv2B7i\"><div class=\"guten-column-wrapper\" data-id=\"Wv2B7i\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-YUscUp\">\n<div class=\"accordion-item guten-Bko7tv\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">ThreatTrace360 vs.Traditional Scanning &#8211; Mapping the Modern Attack Surface<br><br>September 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/09\/ThreatTrace360-vs.Traditional-Scanning-Mapping-the-Modern-Attack-Surface-Eng.pdf\" title=\"ThreatTrace360 vs.Traditional Scanning \u2013 Mapping the Modern Attack Surface \u2013 Eng\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"eYRsNx\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-eYRsNx layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-E03uUp\"><div class=\"guten-column-wrapper\" data-id=\"E03uUp\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-R1KfEg\">\n<div class=\"accordion-item guten-LBjIvC\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Effective Response to Ransomware Attacks: The Crucial Role of Digital Forensics<br><br>September 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p class=\"has-startupzy-primary-color has-text-color has-link-color wp-elements-0aaad6757da4ba8a67f43e08250c152c\"><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/09\/Effective-Response-to-Ransomware-Attacks-The-Crucial-Role-of-Digital-Forensics-Eng.pdf\" title=\"Effective Response to Ransomware Attacks \u2013 The Crucial Role of Digital Forensics \u2013 Eng\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-sd5b6R\"><div class=\"guten-column-wrapper\" data-id=\"sd5b6R\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-0XgCz1\">\n<div class=\"accordion-item guten-iGAZFm\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Vehicle Forensics: Unlocking the Secrets Hidden in Your Car<br><br>January 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/01\/Vehicle-Forensics-Unlocking-the-Secrets-Hidden-in-Your-Car.pdf\" title=\"Vehicle Forensics \u2013 Unlocking the Secrets Hidden in Your Car\">English Version<\/a><\/p>\n\n\n\n<div class=\"guten-element guten-spacer guten-kZT5i4\"><\/div>\n\n\n\n<figure class=\"wp-block-audio alignleft\"><audio controls src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/02\/Vehicle-Forensics-Unlocking-the-Secrets-Hidden-in-Your-Car.mp3\"><\/audio><figcaption class=\"wp-element-caption\">Audio Version<\/figcaption><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-saB163\"><div class=\"guten-column-wrapper\" data-id=\"saB163\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-fRXLky\">\n<div class=\"accordion-item guten-ZpYE3Q\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Understanding E-Discovery: Key Differences from Traditional Digital Forensics<br><br>January 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/01\/Understanding-E-Discovery-Key-Differences-from-Traditional-Digital-Forensics.pdf\" title=\"Understanding E-Discovery-Key Differences from Traditional Digital Forensics\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"2DOpeY\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-2DOpeY layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-EfnIdQ\"><div class=\"guten-column-wrapper\" data-id=\"EfnIdQ\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-JzQ4yG\">\n<div class=\"accordion-item guten-4PwYKZ\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Understanding the Current Ransomware Attacks on ESXi Servers<br><br>August 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/Understanding-the-Current-Ransomware-Attacks-on-ESXi-Servers.pdf\" title=\"Understanding the Current Ransomware Attacks on ESXi Servers\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-LlqFUA\"><div class=\"guten-column-wrapper\" data-id=\"LlqFUA\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-MppnTZ\">\n<div class=\"accordion-item guten-CjPIwn\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">How PWA Technology Can Steal Banking Login Credentials from iOS and Android Phones<br><br>August 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/How-PWA-Technology-Can-Steal-Banking-Login-Credentials-from-iOS-and-Android-Phones.pdf\" title=\"How PWA Technology Can Steal Banking Login Credentials from iOS and Android Phones\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-tw08Fa\"><div class=\"guten-column-wrapper\" data-id=\"tw08Fa\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-BXXOv1\">\n<div class=\"accordion-item guten-YZ4aBq\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Mobile Forensics &#8211; Unlocking Critical Evidence<br><br>August 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/Mobile-Forensics-Unlocking-Critical-Evidence.pdf\" title=\"\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"UNXZKx\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-UNXZKx layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-X3JWR8\"><div class=\"guten-column-wrapper\" data-id=\"X3JWR8\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-JOj6e6\">\n<div class=\"accordion-item guten-uvETUt\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Preventing Business Email Fraud<br><br>June 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/06\/Preventing-Business-Email-Fraud-Eng.pdf\" title=\"Preventing Email Bank Transfer Fraud-Eng\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ljVtzM\"><div class=\"guten-column-wrapper\" data-id=\"ljVtzM\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-ifeMEd\">\n<div class=\"accordion-item guten-cClqWg\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">The Challenges of Private Phones in the Workplace<br><br>May 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/05\/The-Challenges-of-Private-Phones-in-the-Workplace-Eng.pdf\" title=\"The-Challenges-of-Private-Phones-in-the-Workplace-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<div class=\"guten-element guten-spacer guten-S9zOJ3\"><\/div>\n\n\n\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/02\/The-Challenges-of-Private-Phones-in-the-Workplace.mp3\"><\/audio><figcaption class=\"wp-element-caption\">Audio Version<\/figcaption><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-GpEZ7c\"><div class=\"guten-column-wrapper\" data-id=\"GpEZ7c\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-KlW9kM\">\n<div class=\"accordion-item guten-gDiRaS\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">\u0e01\u0e23\u0e30\u0e40\u0e1b\u0e4b\u0e32\u0e40\u0e07\u0e34\u0e19\u0e14\u0e34\u0e08\u0e34\u0e17\u0e31\u0e25 (CRYPTO WALLET)               \u0e41\u0e25\u0e30\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e02\u0e2d\u0e07\u0e41\u0e15\u0e48\u0e25\u0e30\u0e1b\u0e23\u0e30\u0e40\u0e20\u0e17 <br><br>March 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-Eng.pdf\" title=\"Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-TH.pdf\" title=\"Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"9VS997\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-9VS997 layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-nq5pxZ\"><div class=\"guten-column-wrapper\" data-id=\"nq5pxZ\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-g5PWZa\">\n<div class=\"accordion-item guten-6ZOBqn\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">\u0e02\u0e31\u0e49\u0e19\u0e15\u0e2d\u0e19\u0e01\u0e32\u0e23\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e17\u0e35\u0e21\u0e15\u0e2d\u0e1a\u0e2a\u0e19\u0e2d\u0e07\u0e15\u0e48\u0e2d\u0e40\u0e2b\u0e15\u0e38\u0e01\u0e32\u0e23\u0e13\u0e4c:                                 A STEP-BY STEP GUIDE <br><br>February 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-Eng.pdf\" title=\"Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-TH.pdf\" title=\"Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-E5T57S\"><div class=\"guten-column-wrapper\" data-id=\"E5T57S\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-UJShyl\">\n<div class=\"accordion-item guten-Zwjvx4\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">\u0e04\u0e27\u0e32\u0e21\u0e2b\u0e21\u0e32\u0e22\u0e02\u0e2d\u0e07\u0e2b\u0e48\u0e27\u0e07\u0e42\u0e0b\u0e48\u0e1c\u0e39\u0e49\u0e04\u0e23\u0e2d\u0e1a\u0e04\u0e23\u0e2d\u0e07\u0e1e\u0e22\u0e32\u0e19\u0e2b\u0e25\u0e31\u0e01\u0e10\u0e32\u0e19 (COC)                                         \u0e41\u0e25\u0e30\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e1e\u0e22\u0e32\u0e19\u0e2b\u0e25\u0e31\u0e01\u0e10\u0e32\u0e19\u0e17\u0e32\u0e07\u0e14\u0e34\u0e08\u0e34\u0e17\u0e31\u0e25 <br><br>February 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-Eng.pdf\" title=\"Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-TH.pdf\" title=\"Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-mS6GY3\"><div class=\"guten-column-wrapper\" data-id=\"mS6GY3\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-u1obCQ\">\n<div class=\"accordion-item guten-zmjDaG\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">THE LATEST CYBERCRIME TRENDS IN THAILAND:      STAYING VIGILANT IN THE DIGITAL AGE \u2013                            \u0e41\u0e19\u0e27\u0e42\u0e19\u0e49\u0e21\u0e2d\u0e32\u0e0a\u0e0d\u0e32\u0e01\u0e23\u0e23\u0e21\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c \u0e43\u0e19\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22\u0e25\u0e48\u0e32\u0e2a\u0e38\u0e14:                                \u0e40\u0e23\u0e32\u0e04\u0e27\u0e23\u0e15\u0e23\u0e30\u0e2b\u0e19\u0e31\u0e01\u0e23\u0e39\u0e49\u0e16\u0e36\u0e07\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19\u0e43\u0e19\u0e22\u0e38\u0e04\u0e14\u0e34\u0e08\u0e34\u0e17\u0e31\u0e25<br><br>February 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-Eng.pdf\" title=\"The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-TH.pdf\" title=\"The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-1238","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages\/1238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/comments?post=1238"}],"version-history":[{"count":0,"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/pages\/1238\/revisions"}],"wp:attachment":[{"href":"https:\/\/icmscyber.com\/th\/wp-json\/wp\/v2\/media?parent=1238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}