No. I can't and won't delete it for you.
No. I can't and won't delete it for you.
Good work requires time. And time requires planning and careful scheduling.
Results will be as good as the direction, time available, and evidence completeness allow us.
Which one are you?
The LEAPPs Artifact Viewer App (LAVA) is right around the corner.
Learn how to build artifacts for the LEAPPs that will work with LAVA.
Watch the video tutorial here: https://www.youtube.com/live/qTgZUh4GPxk?
Dr Zoe Billings and Mark Pannone from Adapt & Evolve join the Forensic Focus Podcast to discuss their unique approach to mental health and well-being in digital forensics. https://www.forensicfocus.com/podcast/digital-forensics-and-stress-understanding-your-bodys-signals/ #DigitalForensics #DFIR #WellBeing
New Open-Source Tool Spotlight
Volatility 3 rebuilds memory forensics with a modular, Python-based architecture. It supports multiple operating systems, extends functionality with plugins, and simplifies analysis in incident response scenarios. #DigitalForensics #MemoryAnalysis
Project link on #GitHub
https://github.com/volatilityfoundation/volatility3
#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity
— P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking
You got me...
Can AI help you examine leaked data safely?
If you do it right, it can...
In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.
He shows how AI can help find important information in big datasets and speed up analysis.
Read here: https://www.pentestpartners.com/security-blog/using-ai-chatbots-to-examine-leaked-data/
To make sure the AI output is correct, it should always be checked against the raw dataset.
EPRS briefing: Access to data for law enforcement: Digital forensics | Think Tank | European Parliament
https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2025)775879
This is one of four briefings that explore different aspects of the roadmap for effective and #lawfulaccess to data for law enforcement. These include a summary of the roadmap, and briefings on #lawfulinterception, #dataretention and #digitalforensics:
Roadmap: https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2025)775880
Lawful interception: https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2025)775881
Data retention: https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2025)775878
"And the AI should make it all quick and easy."
A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.
From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed.
They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?
This attack wasn’t subtle. But it worked because basic controls were missing.
We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.
The competent #DigitalForensics examiner curse.
There is no I in Team.
Chip-Off Forensics in India – The Ultimate Guide!
Ever wondered how experts recover data from damaged or locked devices? Discover the power of advanced chip-off digital forensics and how it's revolutionizing data recovery & mobile investigations in India.
Tap the link to read the full guide! - https://bit.ly/4092fWF
European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025.
#dataretention #lawfulinterception #digitalforensics #encryption
"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"
Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.
When: August 30, 2025 (14:00 – 18:00 UTC)
Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.
Your Squad: Form a team of 2-3 analysts.
The Glory: Solve the case, claim bragging rights, and win prizes for the top team!
Spaces are limited. Assemble your elite team and register now to secure your spot!
Register Here: https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition
European Commission presents Roadmap for effective and lawful access to data for law enforcement - 24 June 2025
https://home-affairs.ec.europa.eu/news/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en
#dataretention #lawfulinterception #digitalforensics #encryption #ai
Understanding tool limitations is just as important and knowing tool capabilities especially when what you need to find is not there and you expected it to be.