A round-up of this week’s digital forensics news and views:
Cellebrite got into Trump shooter’s Samsung device in just 40 minutes
The FBI successfully accessed the locked Samsung smartphone of the deceased Trump shooter using updated digital forensics tools from
A round-up of this week’s digital forensics news and views:
Exploring Host-Based Digital Forensics with Memory Analysis
Forensic experts are turning to memory analysis as a critical tool in uncovering sophisticated cyber attacks. By examining running processes, network connections, and
A round-up of this week’s digital forensics news and views:
Testing a hybrid risk assessment model: Predicting CSAM offender risk from digital forensic artifacts
Researchers conducted a feasibility study for a hybrid risk assessment model that combines traditional tools with
A round-up of this week’s digital forensics news and views:
UK and US cops band together to tackle Qilin’s ransomware shakedowns
In a coordinated response to recent cyberattacks on healthcare systems, UK and US law enforcement agencies have joined forces
A round-up of this week’s digital forensics news and views:
Western Law Enforcement Agencies are Going on the Cyber Offensive
Western law enforcement agencies are increasingly adopting offensive cyber strategies to combat cybercrime, with varying degrees of legal support. The
A round-up of this week’s digital forensics news and views:
UK national accused of hacking dozens of US companies arrested in Spain
Spanish police have arrested a British national accused of leading an organized cybercrime group that broke into dozens
A round-up of this week’s digital forensics news and views:
Navigating the complex world of cell phone forensics: How multiple SIMs and eSIMs impact investigations
There are various challenges that multiple SIM cards and eSIMs in smartphones pose for digital
A round-up of this week’s digital forensics news and views:
Operation Endgame: Coordinated Worldwide Law Enforcement Action Against Network of Cybercriminals
In a groundbreaking international effort called Operation Endgame, the FBI, along with law enforcement agencies from over a dozen
A round-up of this week’s digital forensics news and views:
Potent youth cybercrime ring made up of 1,000 people, FBI official says
A senior FBI official recently disclosed the existence of a substantial and elusive cybercrime ring comprised of around
A round-up of this week’s digital forensics news and views:
BreachForums seized by FBI for 2nd time
In a significant move against cybercrime, the FBI has once again seized control of BreachForums, a notorious online platform linked to cybercriminal activities.
A round-up of this week’s digital forensics news and views:
The REPORT Act Is Now Federal Law – Here’s What It Means for Child Safety
In the current Congressional session (2023-2024), we have seen many bills introduced that relate to
A round-up of this week’s digital forensics news and views:
Russian suspected cybercrime kingpin pleads guilty in US, TASS reports
Alexander Vinnik, accused of laundering over $4 billion via bitcoin, was arrested in Greece in 2017. After a conviction in
We Value Your Privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.