Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Samuel Abbott, Software Trainer, Amped Software

Samuel, congratulations on your new role! Tell us more about your career with the Royal Military Police. How did you come to be a video analysis expert? Thank you! It is a very exciting move for me. My career began

How To Acquire Cloud Data With MD-CLOUD

‘17.5 Zettabytes.’ This is the amount of data that the IDC estimates will be generated annually by 2025, and among those numbers, cloud traffic is expected to grow and reach 18.9 Zettabytes by 2021. This tremendous amount of cloud data

How To Acquire Cloud Data With MD-CLOUD

‘17.5 Zettabytes.’ This is the amount of data that the IDC estimates will be generated annually by 2025, and among those numbers, cloud traffic is expected to grow and reach 18.9 Zettabytes by 2021. This tremendous amount of cloud data

Toward Exact And Inexact Approximate Matching Of Executable Binaries

Lorenz Liebler discusses his research at DFRWS EU 2019. The application of approximate matching (a.k.a. fuzzy hashing or similarity hashing) is often considered in the field of malware or binary analysis. Recent research showed major weaknesses of predominant fuzzy hashing

Interview With Joe Sylve, Director Of Research And Development, BlackBag

Joe, your BlackBag profile describes how you "drive innovation and pursue emerging areas of research" as Director of Research & Development. Can you describe for us what your day-to-day looks like? Usually I’m managing shifting priorities, so there’s not always

Get Audio Redaction In The Latest Amped FIVE Update 16112

Amped Software announced the release of another update to Amped FIVE, our one-stop toolkit for all your video and image enhancement needs. Update 16112 includes some exciting new features. Our users will be happy to know that Amped FIVE now

10 Quick Facts About Oxygen Forensic Cloud Extractor

In October 2014, Oxygen Forensics changed the DFIR landscape by bringing the first Cloud extraction tool to the forensic industry. This innovative, and included utility, was available within the powerful Oxygen Forensic® Detective software and allowed acquisition of data from

Sarah Edwards On iOS Forensics And APOLLO

Christa: Hello and welcome to the Forensic Focus podcast. Monthly we interview experts from the digital forensics and incident response community on a host of topics ranging from technical aspects to career soft skills. I’m your host, Christa Miller. Today

NIST Test Results For Mobile Device Acquisition Tools – MSAB XRY

The results are out. The U.S. National Institute of Standards and Technology has published its report on the performance of XRY 8.1.0 in recovering and analyzing mobile device data using JTAG and chip off methods. This is part of NIST’s

Toward Exact And Inexact Approximate Matching Of Executable Binaries

Lorenz Liebler discusses his research at DFRWS EU 2019.The application of approximate matching (a.k.a. fuzzy hashing or similarity hashing) is often considered in the field of malware or binary analysis. Recent research showed major weaknesses of predominant fuzzy hashing techniques