Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

FORMOBILE Survey: Law Enforcement Officers’ Requirements For Training

For a project that promises great leaps in the development of mobile forensic related technologies, and a complete guide to the practices and standards that professionals in Europe should follow, the necessary training to support these initiatives is critical! That

Australian Police: XAMN Helped Solve Armed Robbery

By: Jeremy Byers, a police investigator in Australia This post was originally written and published on the MSAB blog I have been employed as a member of the Australian Federal Police and the South Australian Police since 2008. Most of

Forensic Focus Forum Round-Up

Welcome to this month’s round-up of recent posts to the Forensic Focus forums. Can you tell whether files have been copied from one USB to another? What temperature should your forensic lab be? How do you process large amounts of

What’s Happening In Forensics – Feb 20, 2020

Nominations are open for the 2020 Forensic 4:Cast awards. FireEye discuss how to correlate user search LNK files. Group IB share a forensic view of Chromium-based Microsoft Edge. ElcomSoft release iOS Forensic Toolkit 5.30, including jailbreak-free extraction for multiple Apple

Register For Webinar: Triaging Digital Evidence With MacQuisition

Have you ever served a search warrant and stared at the mountainous amount of digital media collected and wondered how much is actually related to your investigation? Or, have you had to undertake terabytes of storage media and wondered if

Interview With Steve Lin, President, Susteen

Steve, you've been Susteen's president for a little more than two years. Tell us more about what led you to the company and what appealed to you about leading it. The reason I joined the company is because we can

Steve Lin, President, Susteen

Steve, you've been Susteen's president for a little more than two years. Tell us more about what led you to the company and what appealed to you about leading it. The reason I joined the company is because we can

What’s Happening In Forensics – Feb 19, 2020

Belkasoft now supports checkm8 acquisition. Cellebrite share a case study showing how extraction of deleted videos can help in criminal investigations. Peter M. Stewart shares a round-up of Defcon 2019 DFIR CTF.

Oxygen Forensics Introduces Partnership With Latent Wireless

Oxygen Forensics announces Oxygen Forensics Detective 12.2 update, including import features for Instagram and Facebook warrants, advanced iOS and Android OS extraction capabilities Oxygen Forensics, a global leader in digital forensics for law enforcement, federal, and corporate clients, today announced

NIST Tests Forensic Methods For Getting Data From Damaged Mobile Phones

by Richard Press Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the evidence anyway. Now, researchers at the National Institute of

NIST Tests Forensic Methods For Getting Data From Damaged Mobile Phones

by Richard Press Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the evidence anyway. Now, researchers at the National Institute of

What’s Happening In Forensics – Feb 13, 2020

Heather Mahalik shares some tips for unlocking extra data in iPhone extractions. Ian Barwise talks about what it’s like to be a digital forensic examiner, and looks at some subsets of the career path. Joseph W. Shaw II discusses why

The Rise Of Evil HID Devices

Arthur Villeneuve and Franck Bitsch discuss their research at DFRWS EU 2019. Arthur: Good morning. My name is Arthur, this is Franck. We are going to talk about malicious HID devices. We represent what is HID devices just after. We’re

The Rise Of Evil HID Devices

Arthur Villeneuve and Franck Bitsch discuss their research at DFRWS EU 2019.Arthur: Good morning. My name is Arthur, this is Franck. We are going to talk about malicious HID devices. We represent what is HID devices just after. We’re working

What’s Happening In Forensics – Feb 12, 2020

Amped Software demonstrate how to investigate which camera model took a picture using EXIF metadata and JPEG quantization tables. The call for presentations and workshops is open for DFRWS USA 2020. Ed Michael reminds us about the importance of taking