5 free digital forensics tools to boost your investigations

Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information for auditors, legal teams, and law enforcement agencies in … Continue reading 5 free digital forensics tools to boost your investigations

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties. “Wh… Continue reading DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. MVT supports using public indicators of compromise (… Continue reading Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise

Kali Linux 2023.1 released – and so is Kali Purple!

OffSec (formerly Offensive Security) has released Kali Linux 2023.1, the latest version of its popular penetration testing and digital forensics platform, and the release is accompanied by a big surprise: a technical preview of Kali Purple, a “on… Continue reading Kali Linux 2023.1 released – and so is Kali Purple!

Dissect: Open-source framework for collecting, analyzing forensic data

A game changer in cyber incident response, the Dissect framework enables data acquisition on thousands of systems within hours, regardless of the nature and size of the IT environment to be investigated after an attack. Dissect framework development Fo… Continue reading Dissect: Open-source framework for collecting, analyzing forensic data

Ali Hadi and Jessica Hyde on Accessible, Affordable Digital Forensics Training

Christa: As cyber crimes and incidents rise, so does the need for well prepared, professional, digital forensics and incident response practitioners. However, while there’s no shortage of digital forensics training and education, whether … Continue reading Ali Hadi and Jessica Hyde on Accessible, Affordable Digital Forensics Training

Release Alert: Acquire 150+ digital evidence types with one click!

With the latest version of TACTICAL v2.7.4, you can now acquire 152 types of digital evidence out of the box, adding almost 30 new types. 

Binalyze TACTICAL was already the fastest and most comprehensive forensic evidence collector available. No… Continue reading Release Alert: Acquire 150+ digital evidence types with one click!

Three reasons why ransomware recovery requires packet data

Data from SonicWall’s 2021 Cyber Threat Report showed more ransomware attacks in the first half of 2021 than in all of 2020. Much of the recent conversation around ransomware (fueled by attacks like the Colonial Pipeline and Kaseya) has focused on prev… Continue reading Three reasons why ransomware recovery requires packet data

Should You Hire a Computer Forensics Specialist?

The need for computer and digital forensics experts is growing significantly due to the increase in cyberattacks, with digital forensics skillsets becoming a critical element in helping IT security teams learn from security incidents. This type of kno… Continue reading Should You Hire a Computer Forensics Specialist?