shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

253
active users

#digitalforensics

0 posts0 participants0 posts today
Forensic Focus<p>Dr Zoe Billings and Mark Pannone from Adapt &amp; Evolve join the Forensic Focus Podcast to discuss their unique approach to mental health and well-being in digital forensics. <a href="https://www.forensicfocus.com/podcast/digital-forensics-and-stress-understanding-your-bodys-signals/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forensicfocus.com/podcast/digi</span><span class="invisible">tal-forensics-and-stress-understanding-your-bodys-signals/</span></a> <a href="https://dfir.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://dfir.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://dfir.social/tags/WellBeing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WellBeing</span></a></p>
Loki the Cat<p>Gmail's secret IP tracking just cracked a murder case wide open - the 'victim's' email came from the suspect's hotel, not her location. $23.2M verdict but he's free due to extradition issues. Moral: Your digital footprints are forever, but justice has borders. 💻🌍</p><p><a href="https://yro.slashdot.org/story/25/07/20/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/07/2</span><span class="invisible">0/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death</span></a></p><p><a href="https://toot.community/tags/Gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gmail</span></a> <a href="https://toot.community/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://toot.community/tags/WrongfulDeath" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WrongfulDeath</span></a></p>
Pen Test Partners<p>A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.</p><p>From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed. </p><p>They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?</p><p>This attack wasn’t subtle. But it worked because basic controls were missing. </p><p>We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.</p><p>📌<a href="https://www.pentestpartners.com/security-blog/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Aristotelis Tzafalias<p>European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025. <br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p><p>"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"</p><p><a href="https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ec.europa.eu/transparency/expe</span><span class="invisible">rt-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005</span></a></p>
The DFIR Report<p>Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.</p><p>🗓️ When: August 30, 2025 (14:00 – 18:00 UTC)<br>🛠️ Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.<br>🕵️ Your Squad: Form a team of 2-3 analysts.<br>🏆 The Glory: Solve the case, claim bragging rights, and win prizes for the top team!</p><p>Spaces are limited. Assemble your elite team and register now to secure your spot!</p><p>Register Here: <a href="https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dfirlabs.thedfirreport.com/dfi</span><span class="invisible">rchallenge-enterprise-edition</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>

Your mobile device /laptop/ smart home/ car, knows you better than you know yourself.

In forensics the term every touch leaves a trace is a core tenet of the profession this is very definitely extra true for the digital landscape !
The absence of information is ALSO important if there is no traces for a week then the device wasn’t turned on why wasn’t it turned on, and these days phones aren’t really off, (read transit passes) when you turn off your device you don’t automatically clear the state !! Memory is saved and then restored to increase boot speed..

Know your digital footprint !

#audhd #digitalforensics
special interest brain splurge

Pakistani authorities have arrested 21 individuals tied to HeartSender, a long-running phishing and malware-as-a-service operation. The group is linked to global BEC scams and phishing attacks targeting Microsoft 365, iCloud, and more—causing tens of millions in losses.

This takedown highlights the growing international cooperation in cybercrime investigations and the importance of strong digital defenses.

🔗 Read more via @briankrebs (KrebsOnSecurity): krebsonsecurity.com/2025/05/pa

krebsonsecurity.comPakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Security

Digital Forensic by Nilakshi Jain, 2019

This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic.

@bookstodon
#books
#nonfiction
#DigitalForensics

@hacks4pancakes (@dragosinc) will join us on March 19 for our Foundations of DFIR panel!

While that's a few weeks away, you can check out Lesley's blog post on The Shifting Landscape of OT Incident Response which illustrates the importance of specialized incident response and digital forensics in maintaining the security and integrity of OT systems.

Find it here: dragos.com/blog/the-shifting-l

If you want to catch Lesley along with panelists @danonsecurity, David Bianco, and Sarah Sabotka for unique insights on bolstering your DFIR foundations, save your spot here: domaintools.com/webinar-gettin

Practical Digital Forensics: A Guide for Windows and Linux Users by Akashdeep Bhardwaj & Pradeep Singh & Ajay Prasad, 2024

A comprehensive resource for novice and experienced digital forensics investigators. This guide offers detailed step-by-step instructions, case studies, and real-world examples to help readers conduct investigations on both Windows and Linux operating systems.

@bookstodon
#books
#nonfiction
#DigitalForensics
#Linux
#Windows

Daily Inspiration: "It's the types of crime that we can't yet imagine that we should be worried about!" - Futurist Jim Carroll

Later today, I'll be doing a talk for the senior leadership team of the RCMP - that's the Royal Canadian Mounted Police - on the future impact of AI. I'll have a few hundred police and civilian officials in the room and will take a pretty broad but intense look into the future. I'll be covering both the opportunity for the use of AI for crimefighting and public safety responsibilities, but will also take a look at the fact that the acceleration of AI leads to an accelerated risk of unknown crimes yet to be committed based on technologies that don’t yet exist!

Another way to put a spin on this? It’s the risk of unknown crimes yet to be committed based on technologies that don’t yet exist! That’s the future of policing!

(And yes, I've had a little fun with AI in this post. Look carefully, and that's me in uniform!)

The story of AI in policing is a complex one, involving many new opportunities and new skills to battle comprehensive new criminal risks - and one that is wrapped up in a lot of controversy when it comes to privacy and constitutional rights. And there is no doubt that these issues are going to become even more complex as things speed up.

----
#FutureCrime #AIinPolicing #CyberSecurity #DigitalForensics #EmergingThreats #PredictivePolicing #PublicSafety #TechDrivenCrime #CyberCrime #AIandEthics

Original post: jimcarroll.com/2024/11/daily-i

Advancements in Cybercrime Investigation and Digital Forensics by A. Harisha & Amarnath Mishra & Chandra Singh, 2024

This new volume offers a comprehensive study of the advances that have been made in cybercrime investigations and digital forensics, highlighting the most up-to-date tools that help to mitigate cyber-attacks and to extract digital evidence for forensic investigations to recover lost, purposefully deleted, or damaged files.

@bookstodon
#books
#cybercrime
#DigitalForensics