Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Considerations When Investigating Data From Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We

Interview With Eric Oldenburg, Law Enforcement Liaison, Griffeye

Eric, when we interviewed you last year, you'd just come on board with Griffeye as Technical Liaison to law enforcement. What has the past year in this role taught you, and based on these lessons, where are you taking your

What’s Happening In Forensics – Dec 9, 2019

The inaugural Digital Forensics for National Security Symposium will take place tomorrow and Wednesday in Alexandria, VA. Pro Digital Forensic Consulting share how digital forensics can help in sexual assault cases. Keren Carmeli from Cellebrite shows how to gather data

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches

How To Help Small Governments To Respond To Ransomware Attacks

by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular

How To Help Small Governments To Respond To Ransomware Attacks

by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular

Oxygen Forensics Now Offers Image Categorization And TamTam Cloud Extraction

Oxygen Forensics, a global leader in digital forensics for law enforcement, federal, and corporate clients, today announced their flagship software, Oxygen Forensic Detective 12.1 will bring image categorization and grouping, allowing investigators to use AI to sort and categorize images

How To Easily And Accurately Play CCTV With Amped Replay

by Blake Sawyer, Amped Software For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most

Analysis Of Jump Lists With Belkasoft Evidence Center

Jump Lists are an artifact of the Windows OS. It first emerged in Windows 7: this artifact has been present in all the subsequent versions of the Windows OS ever since.Jump Lists make it possible to get quick access to

MSAB Releases New Versions Of XRY, XAMN And XEC

Now released: XRY 8.2, XAMN 4.5 and XEC 5.3 The new releases of XRY, XAMN and XEC introduce a range of new and improved capabilities, with a strong focus on making it faster and easier than ever for examiners and

Deleted File Fragment Dating By Analysis Of Allocated Neighbors

Ahmed Bajat shares his research at DFRWS EU 2018. Ahmed: Thank you. My name is Ahmed Bahjat, I am here from George Mason University – shoutout to Jessica Hyde. I’ll be talking about file fragments dating; this is probably your

Deleted File Fragment Dating By Analysis Of Allocated Neighbors

Ahmed Bajat shares his research at DFRWS EU 2018.Ahmed: Thank you. My name is Ahmed Bahjat, I am here from George Mason University – shoutout to Jessica Hyde. I’ll be talking about file fragments dating; this is probably your first

Digital Forensic Techniques To Investigate Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics perspective. Finding evidence that a password management