mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.2K
active users

#digitalforensics

4 posts4 participants0 posts today
TechNadu<p>💻 Threat Intel: FMovies Pirate Site Delivered Infostealers at Scale<br>Recent analysis links FMovies to a massive infostealer malware campaign:</p><p>• 30K infections (Lumma, StealC, Vidar, RedLine, Raccoon)<br>• Methods: Cookie theft, JS-injected ads, fake video buttons<br>• Over 15K affected users, 10K+ leaked credentials<br>• Only 12.9% of passwords are classified as strong<br>• Source: Hudson Rock via Microsoft + TorrentFreak</p><p>The platform shut down in August 2024, but infected cookies are still being traded.</p><p>🔗 Read full intel: ⬇️ <br><a href="https://technadu.com/fmovies-pirate-website-linked-to-global-infostealer-activity/603547/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">technadu.com/fmovies-pirate-we</span><span class="invisible">bsite-linked-to-global-infostealer-activity/603547/</span></a></p><p><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/Infostealers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infostealers</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/Malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malvertising</span></a> <a href="https://infosec.exchange/tags/HudsonRock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HudsonRock</span></a></p>
Alexis Brignoni :python: :donor:<p>You got me...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Loki the Cat<p>Gmail's secret IP tracking just cracked a murder case wide open - the 'victim's' email came from the suspect's hotel, not her location. $23.2M verdict but he's free due to extradition issues. Moral: Your digital footprints are forever, but justice has borders. 💻🌍</p><p><a href="https://yro.slashdot.org/story/25/07/20/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/07/2</span><span class="invisible">0/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death</span></a></p><p><a href="https://toot.community/tags/Gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gmail</span></a> <a href="https://toot.community/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://toot.community/tags/WrongfulDeath" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WrongfulDeath</span></a></p>
Pen Test Partners<p>Can AI help you examine leaked data safely?<br>If you do it right, it can...</p><p>In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.</p><p>He shows how AI can help find important information in big datasets and speed up analysis.</p><p>📌Read here: <a href="https://www.pentestpartners.com/security-blog/using-ai-chatbots-to-examine-leaked-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/using-ai-chatbots-to-examine-leaked-data/</span></a></p><p>To make sure the AI output is correct, it should always be checked against the raw dataset.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
Alexis Brignoni :python: :donor:<p>It's us...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a></p>
Pyrzout :vm:<p>Forensic journey: Breaking down the UserAssist artifact structure – Source: securelist.com <a href="https://ciso2ciso.com/forensic-journey-breaking-down-the-userassist-artifact-structure-source-securelist-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/forensic-journey</span><span class="invisible">-breaking-down-the-userassist-artifact-structure-source-securelist-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Digitalforensics</span></a> <a href="https://social.skynetcloud.site/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftWindows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftWindows</span></a> <a href="https://social.skynetcloud.site/tags/Researcherstools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Researcherstools</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/securelistcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securelistcom</span></a> <a href="https://social.skynetcloud.site/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://social.skynetcloud.site/tags/TIandIRposts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TIandIRposts</span></a> <a href="https://social.skynetcloud.site/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://social.skynetcloud.site/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a></p>
Pyrzout :vm:<p>New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting Remote Desktop Protocol <a href="https://cybersecuritynews.com/rdp-forensic-technique/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/rdp-fore</span><span class="invisible">nsic-technique/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Alexis Brignoni :python: :donor:<p>"And the AI should make it all quick and easy." 🙄</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Tedi Heriyanto<p>The Inefficiency in Digital Forensics: <a href="https://cyb3rops.medium.com/the-inefficiency-in-digital-forensics-3da88123d2ec" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyb3rops.medium.com/the-ineffi</span><span class="invisible">ciency-in-digital-forensics-3da88123d2ec</span></a></p><p><a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a></p>
Pen Test Partners<p>A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.</p><p>From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed. </p><p>They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?</p><p>This attack wasn’t subtle. But it worked because basic controls were missing. </p><p>We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.</p><p>📌<a href="https://www.pentestpartners.com/security-blog/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Alexis Brignoni :python: :donor:<p>The competent <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> examiner curse.</p><p><a href="https://infosec.exchange/tags/ScriptingHelps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScriptingHelps</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>There is no I in Team. 🤷‍♂️</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
ECS Infotech Pvt. Ltd.<p>Chip-Off Forensics in India – The Ultimate Guide!</p><p>Ever wondered how experts recover data from damaged or locked devices? Discover the power of advanced chip-off digital forensics and how it's revolutionizing data recovery &amp; mobile investigations in India.</p><p>👉 Tap the link to read the full guide! - <a href="https://bit.ly/4092fWF" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4092fWF</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://mastodon.social/tags/ChipOffForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChipOffForensics</span></a> <a href="https://mastodon.social/tags/DataRecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataRecovery</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://mastodon.social/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a> <a href="https://mastodon.social/tags/TechIndia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIndia</span></a> <a href="https://mastodon.social/tags/ForensicsExpert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForensicsExpert</span></a> <a href="https://mastodon.social/tags/DigitalInvestigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalInvestigation</span></a> <a href="https://mastodon.social/tags/TechBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechBlog</span></a> <a href="https://mastodon.social/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a></p>
ECS Infotech Pvt. Ltd.<p>Chip-Off Forensics in India – The Ultimate Guide!</p><p>Ever wondered how experts recover data from damaged or locked devices? Discover the power of advanced chip-off digital forensics and how it's revolutionizing data recovery &amp; mobile investigations in India.</p><p>👉 Tap the link to read the full guide! - <a href="https://bit.ly/4092fWF" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4092fWF</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ChipOffForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChipOffForensics</span></a> <a href="https://infosec.exchange/tags/DataRecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataRecovery</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a> <a href="https://infosec.exchange/tags/TechIndia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIndia</span></a> <a href="https://infosec.exchange/tags/ForensicsExpert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForensicsExpert</span></a> <a href="https://infosec.exchange/tags/DigitalInvestigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalInvestigation</span></a> <a href="https://infosec.exchange/tags/TechBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechBlog</span></a> <a href="https://infosec.exchange/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a></p>
Andrea Lazzarotto<p>Un punto di vista piuttosto peculiare da parte della polizia spagnola: "Ogni volta che vediamo un <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Pixel, pensiamo che possa essere un narcotrafficante". 👀</p><p><a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://mastodon.social/tags/InformaticaForense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformaticaForense</span></a> <a href="https://mastodon.social/tags/Spagna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spagna</span></a> <a href="https://mastodon.social/tags/Espana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Espana</span></a></p><p><a href="https://pop.lazza.dk/google-pixel-crime" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pop.lazza.dk/google-pixel-crime</span><span class="invisible"></span></a></p>
The DFIR Report<p>🌟New report out today!🌟</p><p>Hide Your RDP: Password Spray Leads to RansomHub Deployment</p><p>Analysis and reporting completed by <span class="h-card" translate="no"><a href="https://infosec.exchange/@tas_kmanager" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tas_kmanager</span></a></span>, @iiamaleks and UC2</p><p>🔊Audio: Available on Spotify, Apple, YouTube and more!</p><p><a href="https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedfirreport.com/2025/06/30/h</span><span class="invisible">ide-your-rdp-password-spray-leads-to-ransomhub-deployment/</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZMy Thoughts on Cyber5W Certified Digital Forensics Foundations (CCDFF) — a solid foundation exam… My Thoughts on Cyber5W Certified Digital Forensics Foundations (CCDFF) — a solid foun...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/digital-forensics" target="_blank">#digital-forensics</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/dfir" target="_blank">#dfir</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/blue-team" target="_blank">#blue-team</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/certification" target="_blank">#certification</a><br><br><a href="https://systemweakness.com/my-thoughts-on-cyber5w-certified-digital-forensics-foundations-ccdff-a-solid-foundation-exam-281a9485c789?source=rss----f20a9840e177---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=IKXzOwJjSHjJiHY0TVHQsm9GIXg&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Aristotelis Tzafalias<p>European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025. <br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p><p>"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"</p><p><a href="https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ec.europa.eu/transparency/expe</span><span class="invisible">rt-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005</span></a></p>
The DFIR Report<p>Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.</p><p>🗓️ When: August 30, 2025 (14:00 – 18:00 UTC)<br>🛠️ Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.<br>🕵️ Your Squad: Form a team of 2-3 analysts.<br>🏆 The Glory: Solve the case, claim bragging rights, and win prizes for the top team!</p><p>Spaces are limited. Assemble your elite team and register now to secure your spot!</p><p>Register Here: <a href="https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dfirlabs.thedfirreport.com/dfi</span><span class="invisible">rchallenge-enterprise-edition</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Aristotelis Tzafalias<p>European Commission presents Roadmap for effective and lawful access to data for law enforcement - 24 June 2025<br><a href="https://home-affairs.ec.europa.eu/news/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">home-affairs.ec.europa.eu/news</span><span class="invisible">/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en</span></a><br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a></p>