Week 04 – 2024

Ann BransomHunting for File Deletion Artifacts in Google File Stream Data Monica Harris at CellebriteHow Cellebrite and Relativity’s Mobile Advisory Board is Shaping the Future of Mobile eDiscovery Bret at Cyber GladiusThe Active Directory Access Control List Explained Cyber TriageDFIR Next Steps: What To Do When You Find Mimikatz Was Run ForensafeInvestigating iOS Voice Triggers […]

Week 03 – 2024

Alexis Brignoni at ‘Initialization Vectors’SQLite 3.45 introducing binary JSON BelkasoftThe Investigator’s Guide to Android Acquisition Methods. Part I: Device Nate Bill at Cado SecurityContainerised Clicks: Malicious use of 9hits on vulnerable docker hosts CCL SolutionsSQLite’s New Binary JSON Format Foxton ForensicsInvestigating Microsoft Teams IndexedDB data International Journal of Electronic Security and Digital ForensicsVolume 16 Issue […]

Week 02 – 2024

Cyber 5W Memory Forensics – Practical Example, Detect Classic Remote Process Injection Malware Analysis – How to Bypass Anti-Debugging Tricks – Part 1 Oleg Afonin at ElcomsoftWhen Extraction Meets Analysis: Cellebrite Physical Analyzer Matt Shannon at F-ResponseF-Response and Apple, 2024 Edition ForensafeInvestigating iOS Calls Oxygen ForensicsHuawei Forensics: Data Extraction and Encryption Pending InvestigationsDissect vs SysInternals […]

Week 01 – 2024

Amged WagehDriveFS Sleuth — Revealing The Hidden Intelligence Cado Security The Importance of Depth: Cloud Forensics Beyond Log Analysis  The Cado Platform can now Capture AWS EC2 Systems into E01 Format ElcomsoftA Comprehensive Guide to Essential Tools for Elcomsoft iOS Forensic Toolkit ForensafeInvestigating iOS Venmo Gerardo Santos at Security Art WorkClusterización de Amenazas y Threat Hunting Taz […]