UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Building Stack Traces From Memory Dump Of Windows x64

Yuto Otsuki discusses his research at DFRWS EU 2018.Yuto: Thank you, chairperson. I am Yuto Otsuki, a researcher at NTT Secure Platform Laboratories in Japan. Today, I’d like to talk about building stack traces from memory dump of Windows x64.

Building Stack Traces From Memory Dump Of Windows x64

Yuto Otsuki discusses his research at DFRWS EU 2018. Yuto: Thank you, chairperson. I am Yuto Otsuki, a researcher at NTT Secure Platform Laboratories in Japan. Today, I’d like to talk about building stack traces from memory dump of Windows

Upcoming Webinar: Face Recognition in Analyze DI Pro

Date: April 25, 2019Time: 3 pm CEST (9 am EST)Registration: Click here Join us for this highly anticipated webinar and learn about one of Griffeye’s most advanced and appreciated technologies: Face Recognition in Analyze DI Pro. When dealing with millions

Windows Registry Analysis 101

by Chirath De Alwis Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. When considering computer forensics, registry forensics plays a huge role because of the amount of the data that is

Windows Registry Analysis 101

by Chirath De Alwis Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence [1].  When considering computer forensics, registry forensics plays a huge role because of the amount of the data that

Techno Security And Digital Forensics Conference CA 2019 – Recap

by Mattia Epifani The Techno Security and Forensics CA conference took place between 11th and 13th March at The Hilton Torrey Pines in La Jolla (San Diego). More than 200 attendees were present, coming from different fields like digital forensics,

Techno Security And Digital Forensics Conference CA 2019 – Recap

by Mattia Epifani The Techno Security and Forensics CA conference took place between 11th and 13th March at The Hilton Torrey Pines in La Jolla (San Diego). More than 200 attendees were present, coming from different fields like digital forensics,

Oxygen Forensics Launches Industry Exclusive Drone Update

Oxygen Forensics today becomes the sole company in the industry to offer complete flight history extraction from my MyParrot cloud with the release of Oxygen Forensic Detective (11.3). “Oxygen Forensics continues to ensure our customers have the solutions they need

Career Paths In Digital Forensics

by Christa Miller, Forensic Focus In the 30 or so years since the advent of personal computers made digital forensics a viable career path, the profession has matured to the extent of making multiple career paths possible. Now, professionals who

Passware Kit 2019 v2 Released: Extracts Data From iCloud Keychain & LastPass

What’s New Extraction of iCloud keychain records Export and import of password recovery state Password recovery for LastPass databases Passwords extraction from 1Password databases Instant decryption of VeraCrypt volumes for Linux Password recovery for LUKS: support for an additional encryption

Digital Forensics Jobs And Career Paths

Digital forensics jobs and career paths
Digital forensics jobs and career path options have grown significantly over the past few decades. In fact, the profession has matured to the extent of making multiple career paths possible. Now, professionals who are interested in finding a job in

CGC Monitor: A Vetting System For The DARPA Cyber Grand Challenge

Michael Thompson and Timothy Vidas discuss their work at DFRWS US 2018.Joe: So, here we have Michael and Tim, who will be talking about their paper, ‘CGC Monitor: A Vetting System for the DARPA Cyber Grand Challenge’.Timothy: Hi. Thanks for

CGC Monitor: A Vetting System For The DARPA Cyber Grand Challenge

Michael Thompson and Timothy Vidas discuss their work at DFRWS US 2018. Joe: So, here we have Michael and Tim, who will be talking about their paper, ‘CGC Monitor: A Vetting System for the DARPA Cyber Grand Challenge’.Timothy: Hi. Thanks

Find More Evidence That Matters With Magnet AXIOM 3.0

We’re excited to release the most powerful and comprehensive version of Magnet AXIOM: Magnet AXIOM 3.0. With AXIOM 3.0, we’re giving you the ability to recover digital evidence from more sources than ever before (including Mac computers and new cloud

Using The Content-Length Header Field In Email Forensics

by Arman Gungor As forensic examiners, we often have to analyze emails in isolation without the benefit of server metadata, neighbor messages, or data from other sources such as workstations. When authenticating an email in isolation, every detail counts—we review