Digital Forensics Round-Up, September 28 2023

A round-up of this week’s digital forensics news and views:


The Emergence of Artificial Intelligence in Digital Forensics

As the digital landscape continually evolves, so do the criminal activities within it. Today the cybercrime sector grandly expands its arm, necessitating the need for more robust and efficient ways to investigate it…

Read More (LinkedIn)


Latest Must-Read Malware Analysis Blogs

In this brief post, we present a selection of recent malware analysis write-ups. Our goal is to highlight the contributions of individuals who share their passion for malware analysis with the community…

Read More (SANS)


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.

Unsubscribe any time. We respect your privacy - read our privacy policy.



Threat Actors Actively Using Remote Management Tools to Deploy Ransomware

The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive ransomware distribution…

Read More (GBHackers)


OSCE Provides Digital Forensics Training to Turkmenistan Officials

The OSCE Secretariat’s Transnational Threats Department (TNTD) and the OSCE Centre in Ashgabat held a course on digital forensics at the Institute of the Ministry of Internal Affairs of Turkmenistan…

Read More (Mirage News)


Cell Phone Tracking And SS7 – Hacking Security Vulnerabilities To Save Lives

Ryan joins Si and Desi to discuss his research into SS7 hacking and cell phone tracking. As someone passionate about radio technology, Ryan became interested in cell networking and eventually discovered he could intercept calls and texts by building fake cell towers…

Read More (Forensic Focus)


Why is there a backlog of cases involving electronic devices?

Our report on a former Great Falls High School teacher charged with sexual abuse after explicit images were found on his phone left us and others asking – why did the investigation take so long…

Read More (KRTV)


DFSP # 396 – URL Leak

This week I will talk about investigating data spill cases involving exposed URLs. This is a typical privacy investigation many incident response teams handle…

Read More (Digital Forensic Survival Podcast)


Medusa ransomware compromises Philippines’ universal healthcare agency

The Philippine Health Insurance Corporation, which manages the country’s universal healthcare system, had its websites and portals disrupted by a Medusa ransomware attack last week, from which it is struggling to recover…

Read More (SC Media)


Rowan Sheriff responds to privacy concerns over device that unlocks cellphones

Should law enforcement have the right to access information from your cellphone by bypassing the password? Privacy concerns were raised by some residents about the program used by the Roan Sheriff’s Office…

Read More (WBTV)


Video Deinterlacing

When cinemas were first introduced at the end of the 19th century, viewers enjoyed watching the illusion of movement on a big screen. This consisted of a number of still images (or frames) rapidly and progressively projected from film onto screen from one end of a big room to another…

Read More (Amped Software)


Online Ads Can Infect Your Device with Spyware

Each day, you leave digital traces of what you did, where you went, who you communicated with, what you bought, what you’re thinking of buying, and much more…

Read More (Scientific American)


A SIEM On the Cheap – Using Sqlite for Data Analysis

When doing investigations, its quite common to need to read large amounts of data, usually contained in CSV Files. While there are many solutions out there for reading these files, the more I have used SIEM’s for searching, the more I have found myself craving a SQL Approach to analysing this data…

Read More (Angry-Bender’s Blog House)

Leave a Comment