Week 33 – 2024

Andrea FortunaDigital Detectives vs. Android 14: overcoming new forensic challenges Digital Forensics MyanmareCDFP (Module-6) (Window Forensics) (Part – 6) ForensafeInvestigating Android Here WeGo Kevin StokesPlaso Super Timelines and CloudTrails Oxygen ForensicsmacOS Extraction of System Artifacts with Oxygen Forensic® KeyScout Kokab Rasool at Paraben CorporationMemory Forensics Tools Overview Rajendra Prasanth SFile System tunnelling John Brown at […]

Week 32 – 2024

Adam MesserCloud Digital Forensics and Incident Response — AWS IAM Privilege Escalation Leads to EC2… Craig Ball at ‘Ball in your Court’AI Prompt to Improve Keyword Search Mike Wilkinson at Cyber TriageDFIR Next Steps: What To Do After You Find a Suspicious Use Of certutil.exe Decrypting a DefenseOlympics Surveillance, Subway Weapons Detection System, Geofence Search Decision, Privacy […]

Week 31 – 2024

Digital Forensics MyanmareCDFP (Module-6) (Window Forensics) (Part – 5 ) Dr. Neal Krawetz at ‘The Hacker Factor Blog’Reversing Samsung Metadata ForensafeInvestigating Android Firefox Justin De Luna at ‘The DFIR Spot’RDP Bitmap Cache – Piece(s) of the Puzzle Kevin StokesPlaso Super Timelines in Splunk Magnet ForensicsSee the story of your geolocation data with Magnet Review’s Worldmap […]

Week 30 – 2024

Chris Ray at Cyber TriageDFIR Breakdown: Using Certutil To Download Attack Tools 0xdf hacks stuff HTB Sherlock: Tracer HTB Sherlock: Campfire-2 Baris Dincer Forensic Investigation Operations — Complex Linux Forensics Analysis Forensic Investigation Operations — Windows Base III BelkasoftAndroid System Artifacts: Forensic Analysis of Application Usage Digital Forensics Myanmar Digital Forensics with Myanmar Language PDF (View Or Download) eCDFP […]

Week 29 – 2024

Adam MesserCloud Digital Forensics and Incident Response — EC2 Compromise Leads to S3 Bucket Exfiltration Baris Dincer Forensic Investigation Operations — Windows Base I Forensic Investigation Operations — Windows Base II BelkasoftChallenges in Digital Forensics: The Case of the Trump Rally Shooter’s Phone Digital Forensics Myanmar eCDFP (Module-6) (Window Forensics) (Part – 2 ) eCDFP (Module-6) (Window Forensics) (Part – 3 […]

Week 28 – 2024

Atola TechnologiesNeed for Speed: How to Get a Forensic Image Quicker? Clint Marsden at DFIR Insights Exploring Host-Based Digital Forensics with Memory Analysis The role of Incident Response in Cyber Security Introduction to Digital Forensics: Preparing for the Unexpected with Volatility, Wireshark, Hayabusa and FTK Imager Cyber 5WGoogle Drive Forensics Digital Forensics Myanmar Thumbnail Or […]

Week 27 – 2024

Cyber 5WWindows Registry Analysis Decrypting a DefenseNYC ShotSpotter Report, Deepfakes, Video ID Decision, Digital Evidence Standards, & More Django Faiola at ‘Appunti di Informatica Forense’iOS Booking.com – Hotels & Travel ForensafeInvestigating Android Google Drive Ian Whiffin at DoubleBlakBrowserState.db last_viewed_time? (Again) Memory ForensicMemory Mystery Challenge Francis Guibernau at AttackIQEmulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 […]

Week 26 – 2024

0xdf hacks stuffHTB Sherlock: Campfire-1 Any.Run Phishing Incident Report: Facts and Timeline  Analysis of the Phishing Campaign: Behind the Incident AT&T Cybersecurity Business Email Compromise (BEC): Tracking a Threat Actor’s Funny Business Memory Dump Analysis: Using LiME for Acquisition and Volatility for Initial Setup Dr. Giannis Tziakouris and Nadhem Al-Fardan at CiscoDigital Forensics for Investigating […]

Week 25 – 2024

Cesar Quezada at HexordiaFSEvents: How They Work and Why They Matter for Mac Analysis ForensafeInvestigating Android Device Health Services Neetrox at InfoSec Write-upsAnalyzing a Phishing Email Header InginformaticoTriage / Incident Response tools for Linux Justin De Luna at ‘The DFIR Spot’Windows Defender MP Logs – A Story of Artifacts N00b_H@ck3rLetsDefend: Discord Forensics Oliver Hartshorn and […]

Week 24 – 2024

0xdf hacks stuffHTB Sherlock: Noted Atola TechnologyFile Carving and Sector-Level Analysis Campaign and public sector information securitySysmon-Help an investigator out! Craig Ball at ‘Ball in your Court’Garden Variety: Byte Fed. v. Lux Vending Cyber 5WWindows Event Logs Analysis Dhiren Bhardwaj at Digital Forensic Forest Investigating a Data Exfiltration Scenario Transforming Python scripts into .exe – […]