Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Magnet User Summit 2025 is in Nashville!
Magnet User Summit is coming back to Nashville March 17-19, 2025! Join Magnet for the DFIR event of the year. This is your chance to get hands-on training and hear about the newest innovations from Magnet Forensics—including the revolutionary Magnet One, along with the latest in Magnet Nexus, Magnet Graykey, [...]
7 essential Linux forensics artifacts every investigator should know
Linux systems are a cornerstone of modern computing, powering everything from personal devices to enterprise servers. However, their open nature and flexibility also make them prime targets for malicious activities. As a result, Linux forensics plays a crucial role in investigating compromised machines. In this article, we'll explore the top [...]
Oxygen Forensic® Detective: Best solutions for today’s cloud forensics.
In recent years, according to NIST, more varied sources of data have become important, including the cloud. As cloud adoption continues to grow, understanding and advancing cloud forensics practices are essential for investigators who face more challenges in retrieving and analyzing data stored remotely. And with the majority of apps now being cloud-based, [...]
Herramientas de Informática Forense: La Guía Definitiva (2024)
Las herramientas de informática forense han mejorado mucho en los últimos años. Con estos avances, la comunidad de informática forense ahora cuenta con muchas opciones de herramientas para cada fase de una investigación. De hecho, puede haber muchas opciones para seguir. Por eso queríamos reunir la guía definitiva de herramientas [...]
Rusolut tools for data recovery and forensic analysis of vehicles
Rusolut products are known for their advanced capabilities in handling complex data extraction tasks, particularly from flash memory and monolithic devices. Here's an overview of their key offerings - and certified training: 1. Visual NAND Reconstructor (VNR) The VNR is Rusolut's flagship product for data recovery and digital forensics. It [...]
Why you need the features of Oxygen Forensic® Detective
Oxygen Forensic® Detective is a comprehensive digital forensic software solution, renowned for its wide range of powerful features. Here are some of its key capabilities: Cloud Data Extraction: The software excels in cloud forensics, offering the ability to extract data from over 100 cloud services, including popular platforms like WhatsApp, [...]
Use Chip-Off and Rusolut Forensics to recover evidence from damaged, locked, or encrypted devices.
For over 12 years, H-11 Digital Forensics has been providing certified training in Chip-Off, ISP, Vehicle, JTAG, and IoT forensics. Additionally, H-11 offers certified training for advanced data analysis and recovery techniques using Rusolut's VNR Reader and Software. Chip-Off Forensics for Smartphones, Vehicles, and IoT Devices Chip-Off forensics is a [...]
Harmony Email Security is a Preventative Solution!
Did you know Harmony Email Security (HEC) is used by over 30,000 Enterprises? Millions of email mailboxes protected every day. Harmony Email Security is a PREVENTATIVE solution, not reactive. Harmony Email Security is designed to protect email and collaboration platforms from various cyber threats. Here are some key functions and [...]
Magnet Axiom 8.3 is now available
Key Updates in Magnet Axiom 8.3 Comprehensive Support for Home Surveillance Security Camera Apps Recent updates have steadily increased support for mobile applications managing home video surveillance cameras and doorbells. With the rise of video surveillance systems in approximately 37% of U.S. homes, Axiom now supports iOS and Android applications [...]
Benefits of AI for Forensic Examiners
AI has arrived and is being utilized in cyber labs, digital forensics labs, and mobile/smart/IoT device forensics labs to help with investigations and examinations. As a forensics examiner, intel analyst, or smart device investigator, how are you embracing AI in your digital forensic labs? Do you agree that these are, [...]