#digital-forensics

[ follow ]
#cybersecurity
Information security
fromSecurityWeek
2 hours ago

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Thirty-eight cybersecurity-related M&A deals were announced in March 2026, including significant acquisitions by Airbus, AppViewX, Cellebrite, and Databricks.
Information security
fromTheregister
8 hours ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Digital life
fromTODAY.com
5 days ago

Send This to Your Boomer Parents: Avoid AI Scams With 1 Trick From a Deepfake Expert

Artificial intelligence is rapidly improving at creating realistic fake media, leading to increased vulnerability to scams, especially among older adults.
NYC parents
fromPoynter
2 weeks ago

This viral video of a child grieving a fallen US service member was generated by AI - Poynter

AI-generated videos depicting families mourning soldiers in the Iran conflict are spreading virally on social media with millions of views, exploiting tragedy for engagement.
Education
fromComputerWeekly.com
3 weeks ago

Welsh government boosts funding for cyber education | Computer Weekly

The National Digital Exploitation Centre receives £740,000 Welsh Government funding to expand cyber education and careers guidance to 10,000 new learners in southeast Wales through interactive programs on cyber crime, digital forensics, and online safety.
US news
fromwww.theguardian.com
3 weeks ago

Former Super Bowl champion asked ChatGPT about injuries before girlfriend's death, court hears

Former NFL linebacker Darron Lee is charged with first-degree murder of his girlfriend, with prosecutors presenting evidence including ChatGPT searches about injuries and crime scene findings of multiple traumatic injuries.
#murder-trial
#deepfakes
World news
fromwww.bbc.com
1 month ago

How dark web agent spotted bedroom wall clue to rescue girl from years of harm

Investigators identify child-abuse victims on the dark web by analyzing minute visual clues and collaborating with platforms despite heavy obfuscation.
US news
fromwww.npr.org
1 month ago

How the FBI might have gotten inaccessible camera footage from Nancy Guthrie's house

FBI recovered Nest doorbell footage showing a masked person; recovery appears to involve backend residual data and may be affected by tampering or subscription status.
fromFortune
1 month ago

Law enforcement thought Nancy Guthrie's smart camera was disconnected, but Google Nest still had the tape | Fortune

Tuesday's release of video surveillance footage showing an armed, masked person at Nancy Guthrie's doorstep on the night she was abducted has raised a host of questions about why it took so long to publicly release, how it was retrieved and what it means for privacy. The process involved days of searching, the FBI said, after law enforcement initially believed the footage was lost because the camera was disconnected and Guthrie didn't have a subscription to the camera company.
US news
#missing-person
Information security
fromComputerworld
1 month ago

This is why high-value targets should use Lockdown Mode

Apple's Lockdown Mode prevented the FBI from accessing a seized iPhone, demonstrating strong protection against physical wired extraction attempts.
fromMail Online
1 month ago

Smartphones are now the most crucial piece of evidence in crime probes

Smartphones are now the most crucial source of digital evidence in solving nearly every criminal investigation, a report has found. Detectives rely on the wealth of information held on the devices in 97 per cent of cases - double the number in which data from laptops was needed. With the devices containing swathes of detailed messages, photos and location data, police chiefs told the Mail the devices had become 'a crime scene in your pocket'.
Digital life
US news
fromBoston.com
1 month ago

Former North Shore police officer gets prison time for child porn charge

Alexander Aiello, a former Gloucester police officer, was sentenced to four years in prison and five years' supervised release for receipt of child pornography.
California
fromABC7 San Francisco
2 months ago

Former Antioch mayoral candidate charged with murder 10 years after wife's death deemed a suicide

Former Antioch mayoral candidate charged with murder in his wife's 2015 death after reclassification from suicide based on digital forensic evidence.
Tech industry
fromDataBreaches.Net
2 months ago

INC ransomware opsec fail allowed data recovery for 12 US orgs - DataBreaches.Net

Researchers recovered data stolen by the INC ransomware gang from a dozen U.S. organizations after an operational security failure exposed attacker infrastructure.
New York City
fromFast Company
2 months ago

Digital ticketing was supposed to stop fraud, but ticket scams have gotten worse-just ask Taylor Swift

A 28-year-old ran over 1,000 fake ticket ads, defrauding more than 100 buyers and moving $120,000 through Venmo and Zelle.
Information security
fromTheregister
3 months ago

Accused data thief dumped laptop in river to evade justice

A former Coupang employee stole a security key, accessed data on 33 million customers, retained details for about 3,000 accounts, then deleted the stolen data.
fromtechcrunch.com
3 months ago

How a Spanish virus brought Google to Malaga | TechCrunch

After 33 years, Bernardo Quintero decided it was time to find the person who changed his life the anonymous programmer who created a computer virus that had infected his university decades earlier. The virus, called Virus Malaga, was mostly harmless. But the challenge of defeating it sparked Quintero's passion for cybersecurity, eventually leading him to found VirusTotal, a startup that Google acquired in 2012. That acquisition brought Google's flagship European cybersecurity center to Malaga, transforming the Spanish city into a tech hub.
Information security
#ice
fromWIRED
3 months ago
Information security

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

fromWIRED
3 months ago
Information security

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

Information security
fromTheregister
3 months ago

NHS tech supplier probes cyberattack on internal systems

DXS International experienced a contained cyberattack on office servers with minimal product impact while forensic and regulatory investigations proceed.
Information security
fromSecuritymagazine
5 months ago

Determining the Credibility of Online Threats in a World of Digital Noise

Online threats range from pranks to genuine danger; credible threats show specific details, digital breadcrumbs, and behavioral patterns that enable law enforcement intervention and prevention.
fromIT Pro
5 months ago

What is memory forensics?

Memory forensics is the acquisition and analysis of a system's random access memory (RAM). It provides visibility into transient information that is otherwise absent from persistent storage. This includes kernel structures, process execution trees, loaded DLLs, active network sockets, in-memory registry hives, and injected code segments. Over the years, memory forensics has become a major plank of cybersecurity research, becoming crucial for functions such as discovering stealthy malware like or other sophisticated cyber attacks.
Information security
fromTheregister
5 months ago

Crossed wires derailed a UK child abuse case for months

Details have emerged of a troubling case in which a basic engineering mistake wrecked a digital evidence investigation and led to wrongful accusations. An open judgment [PDF] published by the UK's Investigatory Powers Tribunal, which is responsible for investigating claims of British authorities illegally abusing their powers during the course of an investigation, detailed the impact on three people wrongly accused of child sex offences.
Privacy professionals
Information security
fromDataBreaches.Net
5 months ago

The Alliance That Wasn't: A Critical Analysis of ReliaQuest's Q3 2025 Ransomware Report - DataBreaches.Net

No verifiable evidence exists that LockBit, DragonForce, and Qilin formed an alliance; claims are speculative and unsubstantiated.
Miscellaneous
fromIndependent
6 months ago

Gardai fear missing boy was killed up to four years ago and his remains were hidden

Investigators suspect a north Dublin boy may have been killed up to four years ago with his death concealed and remains hidden.
fromIndependent
7 months ago

Gardai analysing texts between man and woman in Kyran Durnin investigation

Technical experts are focusing on messages from around the time the boy disappeared
Miscellaneous
Privacy professionals
fromWIRED
8 months ago

CBP Wants New Tech to Search for Hidden Data on Seized Phones

CBP is seeking advanced digital forensics tools for analyzing data from electronic devices at the U.S. border.
fromArs Technica
9 months ago

Worst hiding spot ever: /NSFW/Nope/Don't open/You were Warned/

Captain Samuel White approved a search of Bartels' gear, leading to revelations of illegal activities including possession of CSAM and buying it while stationed at Guantanamo.
Privacy technologies
fromBusiness Matters
9 months ago

House of Lords AI summit at London Tech Week warns of 'skills cliff edge' threatening UK's competitive future

The discussions must be grounded in real-world cyber risk scenarios if we're to future-proof UK critical infrastructure.
Artificial intelligence
Tech industry
fromTheregister
9 months ago

Cellebrite gets virtual with $170M Corellium buy

Cellebrite acquires Corellium for $170 million, enhancing its capabilities in digital forensics and security research.
#karen-read
Boston food
fromBoston.com
10 months ago

Livestream: Testimony continues in Karen Read murder retrial

Karen Read is on trial for allegedly murdering Boston Police Officer John O'Keefe, with complexities surrounding evidence and differing accounts of events.
[ Load more ]