Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard
Human error - or perhaps just a friendly reminder that we all need continuous learning and peer review. The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and [...]
Indianapolis Metropolitan Police Department solves 1975 Case Using Genetic Genealogy Testing
On August 19, 1975, at 10:45 p.m. three young teen girls were leaving a gas station in an eastside neigborhood of Indianapolis. The girls decided to hitchhike, and a white male driving a station wagon pulled over and offered to give them a ride. As the girls were in the [...]
Magnet Forensics Acquires High Peaks Cyber, Further Bolstering the Magnet GRAYKEY Labs Research Team
Magnet Forensics Inc., a developer of digital investigation solutions for more than 4,000 enterprises and public safety agencies in over 100 countries, announced today that it has acquired the strategic IP assets of High Peaks Cyber, a business dedicated to developing and delivering full-spectrum cyber capabilities across the government and [...]
VERAKEY Protects! The new consent-based mobile digital forensics tool.
Today, many private companies employ digital forensic experts, cybersecurity professionals, and investigators to extract and process data from commercially owned devices to support various litigation scenarios. Smartphones have become a valuable resource for private companies across hybrid work environments. However, a company’s integrity can be compromised by the data on mobile [...]
Utah Legend Alex Smith Makes History With College Football Hall of Fame Induction
Alex Smith, Randy Moss, Larry Fitzgerald and several other players and coaches were selected as members in the College Football Hall of Fame for 2024. Alex Smith marks the first Utah player in program history to be inducted, as he joins former head coach Ike Armstrong as the only two [...]
Artificial Intelligence Certifications and courses for 2024
IDC predicts that by 2025, the AI software market is poised to generate approximately $791.5 billion in revenue. Companies across diverse sectors, including finance, healthcare, retail, and security, are integrating AI into their operations. AI facilitates enhanced productivity by automating processes, deploying robots and autonomous vehicles, and incorporating technologies like [...]
Can a healthy green plant help identify buried human remains?
Jack Orebaugh, a forensic anthropology major at the University of Tennessee, Knoxville, has a big heart for families with missing loved ones. When someone disappears in an area of dense vegetation, search and recovery efforts can be difficult, especially when a missing person’s last location is unknown. Recognizing the agony [...]
Best in 2024 – it will be a most wonderous year!
Happy New Year, Cyber Forensic Analysts, Digital Investigators, and Mobile Device Examiners. Here's to a year of growth, achievements, and groundbreaking discoveries uncovering the truth. Cheers to a new year filled with digital success, cyber victories, and the relentless pursuit of justice in the digital forensic world! We are here [...]
Magnet GRAYKEY and Magnet VERAKEY – iOS 17 Initial Access Support Available
Following closely on the release of Apple’s annual major iOS update, we are thrilled to announce that Magnet GRAYKEY and Magnet VERAKEY support consent-based, full-file system extractions iOS Devices running Apple iOS 17—including the latest: iPhone 15. While iOS releases bring exciting new features, as well as updated security features [...]
Avanan Harmony – Email Security and Collaboration Apps Protection
Harmony Email & Collaboration ensures comprehensive protection for Microsoft 365, Google Workspace, and various collaboration and file-sharing applications. This solution is specifically crafted for cloud email environments, distinguishing itself as the sole platform that actively PREVENTS threats from infiltrating inboxes, going beyond mere reactions or detections. Experience full-scale security and [...]