SOC Automation: More Secure For Less Cost

Your SOC is on the front line of defending your organization from cyber attacks and they are drowning in a wave of thousands of alerts every single day. This is a serious problem: Inducing high stress and dissatisfaction for analysts

Changing Perceptions Of Large And Complex Investigations

Changing Perceptions of Large and Complex Investigations The perception of what constitutes a “large and complex” investigation has evolved dramatically over the decades. One of the most illustrative examples of this evolution is the Yorkshire Ripper case from the late

How Detego’s Latest Features are Empowering ICAC Investigators

As a seasoned Internet Crimes Against Children (ICAC) investigator with years of experience in conducting investigations and training law enforcement teams, I have witnessed firsthand the challenges that come with combating the exploitation of our most vulnerable population – our

From FileVault To T2: How To Deal With Native Apple Encryption

While Apple’s commitment to user privacy and security remains their priority, the field of computer forensics faces a solid challenge when it comes to extracting evidence from encrypted Apple devices. This article provides comprehensive insights into Apple’s native encryption, covering

Digital Forensics Education, Certification And Training Guide

University Programs Digital forensics training is available in various formats, each with its unique merits and challenges. University programs are one option, offering both undergraduate and postgraduate courses that cater to different levels of expertise and career aspirations. Undergraduate These

OSAC And Standards In The Digital Evidence World

by Steve Johnson AI CLPE, CFA, Standards Ambassador – Organization of Scientific Area Committees (OSAC) for Forensic Science In 1998, as the personal computer and cell phone industry was starting to explode, the Scientific Working Group for Digital Evidence (SWGDE)

Targeted Collections: Balancing Legal Precision And Data Privacy

In this installment of our series exploring the transformative power of Software-as-a-Service (SaaS) architecture in the legal landscape, we delve deep into the art of targeted collections. This crucial component of modern legal data management not only complements our previous

MediaTek Device Extraction With Boot ROM Interface Disabled

by Christoffer Maliniemi, Security Researcher, MSAB Finding that you have a MediaTek device which has its Boot ROM interface disabled land on your desk? Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of

The Pitfalls Of Relying On iTunes Backups For Investigations

In the realm of mobile forensics, iTunes backups have long been a common method for extracting data from iOS devices. However, the increasing sophistication of mobile devices and the evolving landscape of digital evidence have exposed the limitations of iTunes

The Evolution Of E-Crime: From Hacking To Cyberwarfare

The dawn of the digital age brought with it a new breed of criminal – the cybercriminal. As computers and the internet became more ubiquitous in business and personal life, those with malicious intents saw opportunities to exploit these new

How To Use The Macroblocks Filter In Amped FIVE

In this latest article, David Spreadborough, a Forensic Analyst at Amped Software, looks at why compression is a factor when analyzing video before giving us a run-through of the Macroblocks filter in Amped FIVE. Read on to learn more. You

How To Screenshot Mobile Evidence With Mobile Device Investigator 

Cell phones are used for communication, entertainment, and even as essential tools for work. With the widespread usage of smartphones, law enforcement, and digital forensics professionals have recognized the significance of capturing digital evidence from these devices. By taking screenshots,