A round-up of this week’s digital forensics news and views:
The Emergence of Artificial Intelligence in Digital Forensics
As the digital landscape continually evolves, so do the criminal activities within it. Today the cybercrime sector grandly expands its arm, necessitating the need for more robust and efficient ways to investigate it…
Latest Must-Read Malware Analysis Blogs
In this brief post, we present a selection of recent malware analysis write-ups. Our goal is to highlight the contributions of individuals who share their passion for malware analysis with the community…
Threat Actors Actively Using Remote Management Tools to Deploy Ransomware
The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive ransomware distribution…
OSCE Provides Digital Forensics Training to Turkmenistan Officials
The OSCE Secretariat’s Transnational Threats Department (TNTD) and the OSCE Centre in Ashgabat held a course on digital forensics at the Institute of the Ministry of Internal Affairs of Turkmenistan…
Cell Phone Tracking And SS7 – Hacking Security Vulnerabilities To Save Lives
Ryan joins Si and Desi to discuss his research into SS7 hacking and cell phone tracking. As someone passionate about radio technology, Ryan became interested in cell networking and eventually discovered he could intercept calls and texts by building fake cell towers…
Why is there a backlog of cases involving electronic devices?
Our report on a former Great Falls High School teacher charged with sexual abuse after explicit images were found on his phone left us and others asking – why did the investigation take so long…
DFSP # 396 – URL Leak
This week I will talk about investigating data spill cases involving exposed URLs. This is a typical privacy investigation many incident response teams handle…
Read More (Digital Forensic Survival Podcast)
Medusa ransomware compromises Philippines’ universal healthcare agency
The Philippine Health Insurance Corporation, which manages the country’s universal healthcare system, had its websites and portals disrupted by a Medusa ransomware attack last week, from which it is struggling to recover…
Rowan Sheriff responds to privacy concerns over device that unlocks cellphones
Should law enforcement have the right to access information from your cellphone by bypassing the password? Privacy concerns were raised by some residents about the program used by the Roan Sheriff’s Office…
Video Deinterlacing
When cinemas were first introduced at the end of the 19th century, viewers enjoyed watching the illusion of movement on a big screen. This consisted of a number of still images (or frames) rapidly and progressively projected from film onto screen from one end of a big room to another…
Online Ads Can Infect Your Device with Spyware
Each day, you leave digital traces of what you did, where you went, who you communicated with, what you bought, what you’re thinking of buying, and much more…
Read More (Scientific American)
A SIEM On the Cheap – Using Sqlite for Data Analysis
When doing investigations, its quite common to need to read large amounts of data, usually contained in CSV Files. While there are many solutions out there for reading these files, the more I have used SIEM’s for searching, the more I have found myself craving a SQL Approach to analysing this data…