Week 08 – 2024

ForensafeInvestigating Android WhatsApp Lionel NotariiOS Unified Logs – WiFi and AirPlane Mode Stephan BergerAWS Ransomware Teri RadichelInvestigating, Containing, and Removing Malware on a Mac The Sleuth SheetHow to Transition From OSINT Practitioner to Intelligence Analyst Tyler Hudak at TrustedSecMailItemsAccessed Woes: M365 Investigation Challenges Allan Liska at ‘Ransomware Sommelier’LockBit Down! Jinghua Bai at APNICDeep dive into […]

Week 07 – 2024

Cado Security How to be IR Prepared in AWS How to be IR prepared in Azure DCSO CyTecOverview: Evidence Collection of Ivanti Connected Secure Appliances ForensafeInvestigating iOS TikTok PasswareFrom FileVault to T2: How to Deal with Native Apple Encryption Phill Moore, Zach Stanford and Ross Brittain at CyberCXNetScalers are under attack. Or… they were… Bill […]

Week 06 – 2024

Alexis Brignoni at ‘Initialization Vectors’What is cacheV0.db and why are there only images in it? Bullsh*t HuntingBullshit Hunting: Digital Forensics Edition Django Faiola at ‘Appunti di Informatica Forense’iOS WAZE Dr. Tristan Jenkinson at ‘The eDiscovery Channel’COPA v Wright – The Identity Question Takes Centre Stage Oleg Afonin at ElcomsoftBootloader-Level Extraction for Apple Hardware ForensafeInvestigating Android […]

Week 05 – 2024

Andrew MalecIvanti Connect Secure Auth Bypass and Remote Code Authentication CVE-2024-21887 BelkasoftHow to Acquire Digital Evidence with Android Screen Capturer in Belkasoft X Amanda Berlin at BlumiraMasked Application Attack Incident Report CCL SolutionsAn expert deep-dive on data formats Felix Aeppli at Compass SecurityDevice Code Phishing – Add Your Own Sign-In Methods on Entra ID Dr. […]