Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Register For Webinar: Valuable New Capabilities of the Tableau TX1

The latest free update for the OpenTextâ„¢ Tableau TX1 Forensic Imager provides several exciting new features and enhancements guaranteed to improve data acquisition capabilities. Join OpenText on January 29 at 11 am CST for a live webinar, Valuable New Capabilities

OpenForensics: A Digital Forensics GPU Pattern Matching Approach

Ethan Bayne discusses his research at DFRWS EU 2018. Ethan: Hello, everyone. I understand I am the last talk separating you between coffee, so I’ll try to keep it brief. So, my name is Ethan Bayne, I’m coming today from

Digital Forensics News January 2019

OpenText have released EnCase Forensic 8.08, with new cloud and encryption capabilities. There’s only one week left to submit your proposals for DFRWS US 2019, which takes place in Portland, OR in July. The latest version of BlackLight from BlackBag

Forensic Focus Forum Round-Up

Welcome to this month’s round-up of recent posts to the Forensic Focus forums. What are your current best practices when you encounter a device that’s full disk encrypted? Would you be interested in attending a forensics get-together in the US

Powerful Digital Forensics With OpenTextâ„¢ EnCaseâ„¢ Forensic 8.08

Take digital investigations to the next level with new features in OpenTextâ„¢ EnCaseâ„¢ Forensic 8.08. Whether in the field or the lab, digital forensic examiners must overcome investigation roadblocks like OS updates, encryption, new file types, acquisition from the cloud,

How Trustworthy Is Digital Evidence?

Leonhard Hosch shares his research at DFRWS EU 2018. Leonhard: Thank you. I’ll be presenting the paper ‘Controlled Experiments in Digital Evidence Tampering, or How Trustworthy is Digital Evidence?’ I’m Leonhard Hosch, I’m with Felix Freiling, I’m currently doing my

How Trustworthy Is Digital Evidence?

Leonhard Hosch shares his research at DFRWS EU 2018. Leonhard: So, thank you. I’ll be presenting the paper ‘Controlled Experiments in Digital Evidence Tampering, or How Trustworthy is Digital Evidence?’ I’m Leonhard Hosch, I’m with Felix Freiling, I’m currently doing

BlackBag Technologies Releases BlackLight 2018 R4

BlackLight 2018 R4 is officially released! There are several important updates and improvements that will help your software run as efficiently as possible. What's New and Improved? – Apple’s latest picture and video formats (HEIC/HEVC) support– Tagging Improvements– iPhone XS,

Dissecting Malicious Network Traffic To Identify Botnet Communication

by Swasti Bhushan Deb Botnets are well-known in the domains of information security, digital forensics and incident response for hosting illegal data, launching DDOS attacks, stealing information, spamming, bitcoin mining, spreading ransomware, launching brute force attacks, managing remote access to

Dissecting Malicious Network Traffic To Identify Botnet Communication

by Swasti Bhushan Deb Botnets are well-known in the domains of information security, digital forensics and incident response for hosting illegal data, launching DDOS attacks, stealing information, spamming, bitcoin mining, spreading ransomware, launching brute force attacks, managing remote access to