Aligning Forensic Investigations To The MITRE ATT&CK Framework

In this blog we’ll explore how the Cado Security platform leverages the MITRE ATT&CK Framework to enhance forensic investigations. By combining ATT&CK’s comprehensive knowledge with Cado’s powerful investigation capabilities, security teams gain deeper insights into attacker behaviour. What is the

From FileVault To T2: How To Deal With Native Apple Encryption

While Apple’s commitment to user privacy and security remains their priority, the field of computer forensics faces a solid challenge when it comes to extracting evidence from encrypted Apple devices. This article provides comprehensive insights into Apple’s native encryption, covering

Unpacking The SEC’s Cybersecurity Disclosure For Incident Response Teams

The Securities and Exchange Commission (SEC) has introduced new rules mandating public companies to report cybersecurity breaches. This highlights the growing importance of cyber security outside of security and IT teams, requiring c-level leadership to be able to quickly understand the impact

Digital Forensics Education, Certification And Training Guide

University Programs Digital forensics training is available in various formats, each with its unique merits and challenges. University programs are one option, offering both undergraduate and postgraduate courses that cater to different levels of expertise and career aspirations. Undergraduate These

OSAC And Standards In The Digital Evidence World

by Steve Johnson AI CLPE, CFA, Standards Ambassador – Organization of Scientific Area Committees (OSAC) for Forensic Science In 1998, as the personal computer and cell phone industry was starting to explode, the Scientific Working Group for Digital Evidence (SWGDE)

Targeted Collections: Balancing Legal Precision And Data Privacy

In this installment of our series exploring the transformative power of Software-as-a-Service (SaaS) architecture in the legal landscape, we delve deep into the art of targeted collections. This crucial component of modern legal data management not only complements our previous

MediaTek Device Extraction With Boot ROM Interface Disabled

by Christoffer Maliniemi, Security Researcher, MSAB Finding that you have a MediaTek device which has its Boot ROM interface disabled land on your desk? Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of

The Pitfalls Of Relying On iTunes Backups For Investigations

In the realm of mobile forensics, iTunes backups have long been a common method for extracting data from iOS devices. However, the increasing sophistication of mobile devices and the evolving landscape of digital evidence have exposed the limitations of iTunes

The Evolution Of E-Crime: From Hacking To Cyberwarfare

The dawn of the digital age brought with it a new breed of criminal – the cybercriminal. As computers and the internet became more ubiquitous in business and personal life, those with malicious intents saw opportunities to exploit these new

How To Use The Macroblocks Filter In Amped FIVE

In this latest article, David Spreadborough, a Forensic Analyst at Amped Software, looks at why compression is a factor when analyzing video before giving us a run-through of the Macroblocks filter in Amped FIVE. Read on to learn more. You

How To Screenshot Mobile Evidence With Mobile Device Investigator 

Cell phones are used for communication, entertainment, and even as essential tools for work. With the widespread usage of smartphones, law enforcement, and digital forensics professionals have recognized the significance of capturing digital evidence from these devices. By taking screenshots,

Extracting Google Chrome Using Android Agent

Hey there everyone. It’s Ryan from your Oxygen Forensics training team, and today what we’re going to discuss is using our Android agent to collect Google Chrome data as a third party app on our Android devices. This is going

How To Review Mobile Forensics Evidence With Mobile Device Investigator

Data analysis can quickly become overwhelming without proper organization tools. Extracting, analyzing, and reporting on this data efficiently is of paramount importance to investigators.  Mobile Device Investigator (MDI), the analysis section of Mobile Device Investigator, is an invaluable asset for