Digital Forensics Round-Up, March 30 2023

A round-up of this week’s digital forensics news and views:


Memory Forensics R&D Illustrated: Detecting Hidden Windows Services

To begin the series, this post discusses a new detection technique for hidden services on Windows 7 through 11. Since not all readers will be familiar with hidden services and the danger they pose on live systems, we will start with some brief background…

Read More (Volatility Labs)


Why AI Could be Critical in Reducing the Court Backlog

The UK is facing a crisis in its courts. According to a recent report published by the House of Commons Library, the Crown court had nearly 63,000 outstanding cases at the end of September 2022…

Read More (Tech Native)


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.


The Importance of Data that Doesn’t Exist – Part Three (Missing Metadata – A Case Study)

In this series I am looking at the importance of data that is not present. In the previous two articles, I have looked at the use of timelines in identifying missing data, reasons that data from some sources may appear to be missing and considered potential steps to take or alternative locations that may contain that missing data…

Read More (eDiscovery Channel)


Alexa recordings were used to piece together how a domestic abuser murdered his wife

The court heard the couple had an Amazon Alexa, which can control household electrical items when activated by a voice prompt…

Read More (BBC News)


Windows Forensics Challenge Walkthrough (LETSDEFEND)

This is a writeup for the “Windows Forensics” letsdefend challenge. The organization has been the target of a phishing campaign, and as a result, the phishing email has been opened on three systems within our network…

Read More (Medium)


The DEA Quietly Turned Apple’s AirTag Into A Surveillance Tool

Apple’s quarter-size location tracker was hidden in a pill press by the DEA to conduct surveillance. The AirTag’s small size and reliability could make it an attractive tool for cops…

Read More (Forbes)


Perfect Acquisition Part 1: Introduction

Forensic acquisition has undergone significant changes in recent years. In the past, acquisition was relatively easy, with storage media easily separable and disk encryption not yet widespread…

Read More (Elcomsoft)


Regional Countries Urged to Modernize Their Cyber-Crime Laws

The United States Ambassador to Barbados and the Eastern Caribbean, Linda S. Taglialatela, Wednesday recommended that member countries of the Bridgetown-based Regional Security System (RSS) update their cyber-crime laws…

Read More (Caribbean Today)


Arctic Wolf Annual Threat Report Highlights Broad Attacks and Innovative Tactics Become the Norm in Tumultuous Cybercrime Landscape

Report shines a light on the significant impact ransomware, business email compromise, and unpatched vulnerabilities continue to have on organizations of virtually any size…

Read More (Global Newswire)

Leave a Comment

Latest Videos

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feeds settings page to add an API key after following these instructions.

Latest Articles