Digital Forensics Round-Up, November 26 2025

A round-up of this week’s digital forensics news and views:

Agentic Browsers, Intent, and the Coming DFIR Pivot

Brett Shavers argues that agentic browsers are turning one vague prompt into hours of autonomous intrusion, raising the prospect of AI-driven felonies committed while the human sleeps. This breaks traditional intent models and muddies who gets indicted—prompt writer, platform, or no one under Section 230 shields—while initial-access brokers swap teams for a subscription. For DFIR, the battleground moves to live memory and browser artifacts, with early signals like mass tab orchestration hitting breach forums, and investigators’ human judgment becomes the key to tying acts to actors.

Read more (linkedin.com)


Global Experts Renew Malware Evidence Claims in Bhima Koregaon Case

Global digital forensics experts are renewing warnings that key ‘evidence’ in the Bhima Koregaon prosecutions was planted via malware, citing years of independent analyses and noting that officials’ and media materials appear to show the same artifacts. That contention cuts to the core of chain-of-custody and integrity, as investigators are urged to examine logs, implants, and delivery vectors consistent with targeted intrusion rather than user activity. In a fresh appeal, experts say the technical record should now drive legal accountability and case review, while the community weighs the precedent this sets for handling contested digital exhibits.

Read more (thewire.in)


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.

Unsubscribe any time. We respect your privacy - read our privacy policy.



Chip-ID Framework Launches to Aid Flash Memory Identification

Digital forensics analyst Katelyn Rogers has launched a Chip-ID Framework to help investigators identify flash memory chips using visible characteristics when markings are incomplete or misleading. Built with guidance from Justin Nordine and inspired by OSINT Framework, the site lets users filter by physical cues and aims to link directly to make/model datasheets for pinouts. Rogers is inviting community feedback to refine accuracy—promising a handy reference for chip-off and embedded device work.

Read more (proudyoungone.github.io)


Inside FTK Imager Pro: Vendor-Neutral Forensics, Smarter AI, And Exterro’s Forensic Vision

Justin Tolman from Exterro joins the Forensic Focus Podcast to talk about the future of FTK and the role FTK Imager still plays in everyday casework. He explains why the original free version remains available, and what prompted the introduction of Imager Pro with added capabilities like BitLocker decryption and iOS collections. Justin also reflects on his time in law enforcement and training, and why the investigative side of the work still holds a strong pull.

Read more (forensicfocus.com)


Germany Backs Kenya’s DCI With Modern Digital Forensics Gear

Kenya’s Directorate of Criminal Investigations has received a suite of modern digital forensics tools from Germany via AFRIPOL and the German Federal Police, a move officials say will speed up, sharpen, and scale cybercrime investigations. As part of a German‑funded Digital Forensics Project, DCI’s Cyber and Digital Forensics Laboratory has been designated the Eastern Africa regional center of excellence—raising the stakes for evidence handling, lab workflows, and cross‑border case support. In a parallel push on transnational threats, a UNODC- and US-backed workshop in Nairobi focused on system analysis of criminal networks trafficking WMD-related materials and dual‑use goods, signaling deeper regional intelligence coordination.

Read more (the-star.co.ke)


ITASEC26 Digital Forensics Workshop Calls for Practical, AI-Focused Papers

With just days left before the 5 December deadline, Luca Cadonici, alongside co-organizers Silvia Lucia Sanna and Sebastiano Battiato, is calling for practical, case-driven papers for the Digital Forensics Workshop at ITASEC26 in Cagliari on 9 February 2026. Set within the ITASEC26+SERICS joint cybersecurity conference, the program targets tool limitations across mobile, memory, cloud and IoT, while zeroing in on AI-driven challenges from deepfake forensics to investigation-supporting models and courtroom admissibility. Notably, already published works are welcome, signaling an open door for practitioners to surface hard-won lessons and methodologies that labs and law enforcement can put to immediate use.

Read more (itasec.it)


Final Call: Will Docken Scholarship for Small Agency Examiners

Applications for the Will Docken Scholarship are due November 30. It fully funds the 2026 IACIS BCFE training in Orlando, covers lodging, provides a complete equipment kit, adds a 12-month Arsenal Recon subscription, and includes entry into the CFCE program. Eligibility targets government examiners in small city, county, or state agencies with two or fewer digital forensic examiners, while sponsors—including Digital Intelligence, SUMURI, Arsenal Recon, and Debbie Plamondon—underscore community backing for workforce development.

Read more (iacis.com)


Techno Security West Returns to San Diego

Back in San Diego after three years away, Techno Security West drew participants from 28 states and 15 countries—170 of them first‑timers—as the Town and Country Resort kept networking buzzing well past session hours. Erin West’s keynote spotlighted the rise of “pig‑butchering” scams run by transnational crime networks, underscoring the investigative and regulatory hurdles they create for law enforcement and financial institutions. Across 62 sessions led by 67 experts, attendees dug into cryptocurrency tracing, media authentication, mobile forensics and AI, while a lively expo from names like Cellebrite, Magnet and MSAB signaled where tools are heading ahead of Techno East in June and Techno West’s 2026 return.

Read more (forensicfocus.com)

Leave a Comment