eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

209
active users

#digitalforensics

2 posts2 participants0 posts today
Forensic Focus<p>Dr Zoe Billings and Mark Pannone from Adapt &amp; Evolve join the Forensic Focus Podcast to discuss their unique approach to mental health and well-being in digital forensics. <a href="https://www.forensicfocus.com/podcast/digital-forensics-and-stress-understanding-your-bodys-signals/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forensicfocus.com/podcast/digi</span><span class="invisible">tal-forensics-and-stress-understanding-your-bodys-signals/</span></a> <a href="https://dfir.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://dfir.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://dfir.social/tags/WellBeing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WellBeing</span></a></p>
Alexis Brignoni :python: :donor:<p>You got me...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Pen Test Partners<p>Can AI help you examine leaked data safely?<br>If you do it right, it can...</p><p>In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.</p><p>He shows how AI can help find important information in big datasets and speed up analysis.</p><p>📌Read here: <a href="https://www.pentestpartners.com/security-blog/using-ai-chatbots-to-examine-leaked-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/using-ai-chatbots-to-examine-leaked-data/</span></a></p><p>To make sure the AI output is correct, it should always be checked against the raw dataset.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
Markus Kastelitz<p>EPRS briefing: Access to data for law enforcement: Digital forensics | Think Tank | European Parliament<br><a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2025)775879" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europarl.europa.eu/thinktank/e</span><span class="invisible">n/document/EPRS_BRI(2025)775879</span></a><br>This is one of four briefings that explore different aspects of the roadmap for effective and <a href="https://legal.social/tags/lawfulaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulaccess</span></a> to data for law enforcement. These include a summary of the roadmap, and briefings on <a href="https://legal.social/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a>, <a href="https://legal.social/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> and <a href="https://legal.social/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a>:<br>Roadmap: <a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2025)775880" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europarl.europa.eu/thinktank/e</span><span class="invisible">n/document/EPRS_ATA(2025)775880</span></a><br>Lawful interception: <a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2025)775881" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europarl.europa.eu/thinktank/e</span><span class="invisible">n/document/EPRS_BRI(2025)775881</span></a><br>Data retention: <a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2025)775878" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europarl.europa.eu/thinktank/e</span><span class="invisible">n/document/EPRS_BRI(2025)775878</span></a></p>
Alexis Brignoni :python: :donor:<p>"And the AI should make it all quick and easy." 🙄</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Pen Test Partners<p>A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.</p><p>From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed. </p><p>They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?</p><p>This attack wasn’t subtle. But it worked because basic controls were missing. </p><p>We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.</p><p>📌<a href="https://www.pentestpartners.com/security-blog/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Alexis Brignoni :python: :donor:<p>The competent <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> examiner curse.</p><p><a href="https://infosec.exchange/tags/ScriptingHelps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScriptingHelps</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>There is no I in Team. 🤷‍♂️</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Aristotelis Tzafalias<p>European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025. <br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p><p>"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"</p><p><a href="https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ec.europa.eu/transparency/expe</span><span class="invisible">rt-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005</span></a></p>
Aristotelis Tzafalias<p>European Commission presents Roadmap for effective and lawful access to data for law enforcement - 24 June 2025<br><a href="https://home-affairs.ec.europa.eu/news/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">home-affairs.ec.europa.eu/news</span><span class="invisible">/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en</span></a><br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a></p>
DomainTools<p>Pakistani authorities have arrested 21 individuals tied to HeartSender, a long-running phishing and malware-as-a-service operation. The group is linked to global BEC scams and phishing attacks targeting Microsoft 365, iCloud, and more—causing tens of millions in losses.</p><p>This takedown highlights the growing international cooperation in cybercrime investigations and the importance of strong digital defenses.</p><p>🔗 Read more via <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> (KrebsOnSecurity): <a href="https://krebsonsecurity.com/2025/05/pakistan-arrests-21-in-heartsender-malware-service/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/05/pa</span><span class="invisible">kistan-arrests-21-in-heartsender-malware-service/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/BEC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BEC</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a></p>
Andrea Lazzarotto<p>A very nice blog post by Derek Eiri about the inner workings of <a href="https://mastodon.social/tags/Fuji" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fuji</span></a> for <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> forensic acquisition. Tool validation is very important in <a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a>.</p><p><a href="https://mastodon.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://mastodon.social/tags/AppleForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppleForensics</span></a> <a href="https://mastodon.social/tags/MacForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MacForensics</span></a></p><p><a href="https://mreerie.com/2025/05/12/exploring-macos-native-commands-andrea-lazzarotto-fuji/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mreerie.com/2025/05/12/explori</span><span class="invisible">ng-macos-native-commands-andrea-lazzarotto-fuji/</span></a></p>
Alexis Brignoni :python: :donor:<p>And make sure all your references check out.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Pyrzout :vm:<p>How Private Investigators Handle Digital Forensics? <a href="https://hackread.com/how-private-investigators-handle-digital-forensics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/how-private-inves</span><span class="invisible">tigators-handle-digital-forensics/</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a></p>
Alexis Brignoni :python: :donor:<p>🆕 New blog post on Apple Unified Logs (iOS) and how to query them effectively.<br>🪵 Learn how to generate a .logarchive using a macOS device, third-party tools, or straight from files in a full file system extraction.<br>🪵 Use a macOS device to convert the .logarchive into a JSON file for use outside of a macOS environment.<br>🪵 Process the JSON file with iLEAPP in order to query the data using SQLite.</p><p>If you are not looking at unified logs you are missing incredibly valuable evidence in your cases. </p><p>Thanks to the following researchers for their invaluable contributions:<br>🙏 Lionel Notari<br>🙏 Tim Korver<br>🙏 Johann POLEWCZYK<br>🙏 Heather Charpentier</p><p>Read the blog post here:</p><p><a href="https://abrignoni.blogspot.com/2025/05/extraction-processing-querying-apple.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">abrignoni.blogspot.com/2025/05</span><span class="invisible">/extraction-processing-querying-apple.html</span></a></p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/UnifiedLogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnifiedLogs</span></a> <a href="https://infosec.exchange/tags/AppleForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppleForensics</span></a> <a href="https://infosec.exchange/tags/iOSForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOSForensics</span></a> <a href="https://infosec.exchange/tags/iLEAPP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iLEAPP</span></a><br><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a></p>
DEVCE CIC<p>We'd just like to thank everyone who responded to our Pace Section 69 survey. We've nearly finished the report for the Ministry of Justice inquiry and will be sending a copy to all participants who requested one early next week. <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ComputerEvidence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComputerEvidence</span></a> <a href="https://infosec.exchange/tags/Law" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Law</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a></p>
Alexis Brignoni :python: :donor:<p>And old, powerful, and mysterious language...</p><p><a href="https://infosec.exchange/tags/regex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regex</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a></p>
earthling<p>Digital Forensic by Nilakshi Jain, 2019</p><p>This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic. </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/nonfiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nonfiction</span></a> <br><a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a></p>
Alexis Brignoni :python: :donor:<p>If you can't explain how it works, what will you do when it doesn't work?</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
DEVCE CIC<p>If you have a view on how reliable computer evidence is, please tell us here : <a href="https://forms.gle/kyr1xUW11TLHwCyU9" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forms.gle/kyr1xUW11TLHwCyU9</span><span class="invisible"></span></a> or email survey@devce.org <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DigitalEvidence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalEvidence</span></a> <a href="https://infosec.exchange/tags/Law" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Law</span></a> <a href="https://infosec.exchange/tags/Academia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Academia</span></a></p>