photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

246
active users

#digitalforensics

1 post1 participant0 posts today

Can AI help you examine leaked data safely?
If you do it right, it can...

In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.

He shows how AI can help find important information in big datasets and speed up analysis.

📌Read here: pentestpartners.com/security-b

To make sure the AI output is correct, it should always be checked against the raw dataset.

A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.

From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed.

They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?

This attack wasn’t subtle. But it worked because basic controls were missing.

We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.

📌pentestpartners.com/security-b

Continued thread

European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025.
#dataretention #lawfulinterception #digitalforensics #encryption

"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"

ec.europa.eu/transparency/expe

Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.

🗓️ When: August 30, 2025 (14:00 – 18:00 UTC)
🛠️ Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.
🕵️ Your Squad: Form a team of 2-3 analysts.
🏆 The Glory: Solve the case, claim bragging rights, and win prizes for the top team!

Spaces are limited. Assemble your elite team and register now to secure your spot!

Register Here: dfirlabs.thedfirreport.com/dfi

dfirlabs.thedfirreport.comDFIR Labs - Digital Forensics Challenge - Enterprise Edition

How is productivity measured on #DigitalForensics?

Counting how many drives & phones one images is not a measure of expertise or productivity.

How many cases are closed might just show you that incentivizing speed over attention to detail is a recipe for disaster long term.

How do we go about it?