Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hero Image

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

What’s Happening In Forensics

Amped posted a blog about how to deal with interlaced videos in Amped FIVE. Alexis Brignoni demonstrates how to find Badoo chats in Android using SQL queries and the MAGNET App Simulator. Hexacorn plays with delay-loaded DLLs. Harlan Carvey talks

What’s Happening In Forensics

Techno Security MB is under way – keep up to date on Twitter. Binary Hick gives us an in-depth look at Snapchat on Android. Ali Hadi looks at Windows InstallTime vs InstallDate registry values. Foursquare has acquired Placed, meaning it

What’s Happening In Forensics

BlackBag Tech have announced that MacQuisition can now produce decrypted physical images of Apple’s latest systems using the T2 chip. Find Ashley Hernandez’s demonstration here. Didier Stevens has updated hex-to-bin.py to Version 0.0.2, which comes with an option to parse

Interview With Kim Hyun-soo, CEO, HancomGMD

Tell us a bit about your role: what does a day in your life look like? I am Kim Hyun-soo, a founder of HancomGMD. Over the years, my daily routine has been very focused on the sole purpose of making

Kim Hyun-soo, CEO, HancomGMD

Tell us a bit about your role: what does a day in your life look like? I am Kim Hyun-soo, a founder of HancomGMD. Over the years, my daily routine has been very focused on the sole purpose of making

What’s Happening In Forensics

Hexacorn suggests that the Run key in the Windows registry could be interesting for forensic investigators to look at. Harlan Carvey wrote a post discussing troubleshooting and deep knowledge, or what to do when a tool that we’re using doesn’t

The Opportunity In The Crisis: ICS Malware Digital Forensics

by Christa Miller, Forensic Focus Malware aimed at industrial control systems (ICS) is nothing new. Nearly 10 years have passed since Stuxnet first targeted the supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs) associated with centrifuges

What’s Happening In Forensics

The Byton M-Byte is “a premium vehicle, the crowning glory of which is an enormous 4K screen that spreads across the full width of the dashboard, eliminating the need for conventional instruments and dials.” A great repository of information for

AccessData’s AD Enterprise Automates Early Data Collection

Company also rolls out new versions of FTK and AD Lab with enhancements that leverage machine learning to speed up forensics investigations. AccessData Group today announced the release of AD Enterprise 7.1, a new version of its software for managing

Leveraging DKIM In Email Forensics

by Arman Gungor My last article was about using the Content-Length header field in email forensics. While the Content-Length header is very useful, it has a couple of major shortcomings: • Most email messages do not have the Content-Length header

Leveraging DKIM In Email Forensics

by Arman Gungor My last article was about using the Content-Length header field in email forensics. While the Content-Length header is very useful, it has a couple of major shortcomings: Most email messages do not have the Content-Length header field

Review Of Griffeye Analyze DI Pro

by Jade James Griffeye Analyze DI Pro is used by law enforcement agencies and other national security and defence organisations for all sorts of investigations involving large volumes of media files. Although it is perhaps most well known for its

Griffeye Analyze DI Pro

Reviewed by Jade James Griffeye Analyze DI Pro is used by law enforcement agencies and other national security and defence organisations for all sorts of investigations involving large volumes of media files. Although it is perhaps most well known for