Digital Forensics Round-Up, May 13 2026

A round-up of this week’s digital forensics news and views:


Tools & Software

New Open-Source Forensic Browser Released

BlindSite is a new open-source forensic browser and encrypted evidence vault designed for high-risk digital investigations, including dark web and CSAM-adjacent workflows. It captures dynamic web pages, blocks harmful media from investigator view while preserving it encrypted, and exports sealed evidence packages with hashes and audit records. Tor support, chain-of-custody logging, and an authorized-reviewer decryption workflow round out the feature set.

Read more (github.com)


Tools & Software


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.

Unsubscribe any time. We respect your privacy - read our privacy policy.


MalChela v4.1 Adds Mac Malware Analysis

MalChela v4.1 introduces dedicated macOS malware analysis tools covering Mach-O binary parsing, code signature verification, and plist static analysis, with indicators mapped to MITRE ATT&CK techniques. Twelve new Mac-specific detection rules target persistence, keychain access, dylib injection, and sandbox evasion. FileMiner gains session persistence and automatic Mach-O code-sign suggestions, and the release is freely available on GitHub.

Read more (bakerstreetforensics.com)


Interviews

Aid4Mail CEO on Email Forensics Challenges

Fookes Software founder Eric Fookes outlines how email investigations have shifted from local PST and mbox files to cloud-based collection via Microsoft 365 and Google Workspace APIs. Key practitioner insights cover mbox corruption risks, over-collection pitfalls under GDPR data-minimisation rules, and the limits of keyword-only search. Cloud-hosted attachments that no longer exist at their original URLs are flagged as a growing evidence recovery problem.

Read more (forensicfocus.com)


Tools & Software

LEAPPs Artifact Viewer LAVA Hits Beta

The LEAPPs Artifact Viewer Application (LAVA) has launched in beta, offering DFIR examiners a dedicated interface for large artifact datasets that exceed LEAPPs’ HTML reporting limits. Built by key community contributors including Kevin Pagano and James Habben, it adds on-the-fly timezone switching and dark mode. Binaries are available for Windows, Windows ARM, Apple Silicon, MacIntel, and Ubuntu.

Read more (leapps.org)


Tools & Software

Android Adds Intrusion Logging for Spyware Investigations

Google is rolling out Intrusion Logging, an opt-in feature in Android’s Advanced Protection Mode aimed at security researchers and forensic analysts investigating spyware. Previously, Android investigations were hampered by system logs that overwrote quickly and lacked persistence for deep forensic reconstruction. The new capability offers meaningful improvements for mobile forensic examinations of high-risk targets such as journalists and activists.

Read more (techcrunch.com)


Legal & Policy

Countering AI-Generated CSAM Defenses in Court

Defense attorneys are increasingly claiming CSAM is AI-generated, complicating authentication and jury deliberations in ICAC prosecutions. The episode covers why metadata alone is insufficient, how Rule 901 authentication applies, and when expert testimony is essential to rebut speculative deepfake defenses.

Read more (magnetforensics.com)


Research & Techniques

TRUTH Methodology Tackles Unsupported App Artifacts

A presentation from Simply Cyber walks DFIR practitioners through the five-step TRUTH methodology for parsing unsupported third-party apps and commonly overlooked file system artifacts. Jessica H. covers Track Down, Recreate, Unearth, Translate, and Help Others as a structured approach to mobile forensic analysis gaps.

Read more (youtube.com)


Research & Techniques

AI Decodes Tesla Dashcam SEI Telemetry Data

A forensic practitioner used Claude AI to decode and explain SEI telemetry data embedded in Tesla MP4 dashcam footage, completing the analysis in under 90 minutes. The research targets collision investigators and digital forensic examiners who may need to present this evidence in court, covering both methodology and source verification.

Read more (teslasei.netlify.app)


Research & Techniques

WhatsApp Forensic Recovery: SQLite and WAL Artifacts

WhatsApp stores messages in SQLite databases that retain deleted records in freelists and WAL files until overwritten, giving investigators a time-sensitive recovery window. Android devices offer higher recovery potential through freelist persistence and encrypted backup decryption, while iOS applies aggressive vacuuming and sandboxing that narrows that window. Techniques including chip-off, ISP, and checkm8-based full file system extraction extend options for damaged or locked devices.

Read more (linkedin.com)


Training & Events

AI DFIR Competition Seeks Expert Judges

A competition challenging nearly 3,000 participants to build AI agents capable of detecting malicious activity in real DFIR data is now recruiting judges with forensic and AI expertise. Judging runs June 19–July 3 across six criteria including IR accuracy, audit trail quality, and hallucination detection, with $22,000 in prizes at stake.

Read more (sansurl.com)


Research & Techniques

C2PA Content Credentials: What Examiners Must Know

C2PA Content Credentials establish media provenance, not authenticity — a critical distinction for investigators and attorneys. Brandon Epstein explains how credentials can be stripped, why their absence proves nothing, and what practitioners need to understand as adoption grows.

Read more (magnetforensics.com)

Leave a Comment