UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Considerations When Investigating Data From Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We

Considerations When Investigating Data From Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We

Interview With Eric Oldenburg, Law Enforcement Liaison, Griffeye

Eric, when we interviewed you last year, you'd just come on board with Griffeye as Technical Liaison to law enforcement. What has the past year in this role taught you, and based on these lessons, where are you taking your

What’s Happening In Forensics – Dec 9, 2019

The inaugural Digital Forensics for National Security Symposium will take place tomorrow and Wednesday in Alexandria, VA. Pro Digital Forensic Consulting share how digital forensics can help in sexual assault cases. Keren Carmeli from Cellebrite shows how to gather data

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches

How To Help Small Governments To Respond To Ransomware Attacks

by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular

How To Help Small Governments To Respond To Ransomware Attacks

by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular

Oxygen Forensics Now Offers Image Categorization And TamTam Cloud Extraction

Oxygen Forensics, a global leader in digital forensics for law enforcement, federal, and corporate clients, today announced their flagship software, Oxygen Forensic Detective 12.1 will bring image categorization and grouping, allowing investigators to use AI to sort and categorize images

How To Easily And Accurately Play CCTV With Amped Replay

by Blake Sawyer, Amped Software For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most

Analysis Of Jump Lists With Belkasoft Evidence Center

Jump Lists are an artifact of the Windows OS. It first emerged in Windows 7: this artifact has been present in all the subsequent versions of the Windows OS ever since.Jump Lists make it possible to get quick access to

MSAB Releases New Versions Of XRY, XAMN And XEC

Now released: XRY 8.2, XAMN 4.5 and XEC 5.3 The new releases of XRY, XAMN and XEC introduce a range of new and improved capabilities, with a strong focus on making it faster and easier than ever for examiners and

Deleted File Fragment Dating By Analysis Of Allocated Neighbors

Ahmed Bajat shares his research at DFRWS EU 2018. Ahmed: Thank you. My name is Ahmed Bahjat, I am here from George Mason University – shoutout to Jessica Hyde. I’ll be talking about file fragments dating; this is probably your