sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

595
active users

#digitalforensics

1 post1 participant0 posts today
#Digital ⚓️ #Vagabond 🦈<p>Digital Preservation in Popular Culture: Elementary S05E07</p><p>"I managed to isolate the serial number of Mr Trenchman's new camera from the metadata hidden in his YouTube footage"</p><p>NB. couldn't find a better resolution to get a better pic of the video codec! </p><p><a href="https://digipres.club/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://digipres.club/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://digipres.club/tags/Digipres" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Digipres</span></a> <a href="https://digipres.club/tags/Codecs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Codecs</span></a> <a href="https://digipres.club/tags/Elementary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Elementary</span></a> <a href="https://digipres.club/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Alexis Brignoni :python: :donor:<p>You got me...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Loki the Cat<p>Gmail's secret IP tracking just cracked a murder case wide open - the 'victim's' email came from the suspect's hotel, not her location. $23.2M verdict but he's free due to extradition issues. Moral: Your digital footprints are forever, but justice has borders. 💻🌍</p><p><a href="https://yro.slashdot.org/story/25/07/20/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/07/2</span><span class="invisible">0/1559242/how-gmail-server-evidence-led-to-a-jury-verdict-of-232-million-for-wrongful-death</span></a></p><p><a href="https://toot.community/tags/Gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gmail</span></a> <a href="https://toot.community/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://toot.community/tags/WrongfulDeath" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WrongfulDeath</span></a></p>
Pen Test Partners<p>Can AI help you examine leaked data safely?<br>If you do it right, it can...</p><p>In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.</p><p>He shows how AI can help find important information in big datasets and speed up analysis.</p><p>📌Read here: <a href="https://www.pentestpartners.com/security-blog/using-ai-chatbots-to-examine-leaked-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/using-ai-chatbots-to-examine-leaked-data/</span></a></p><p>To make sure the AI output is correct, it should always be checked against the raw dataset.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
Alexis Brignoni :python: :donor:<p>It's us...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a></p>
Alexis Brignoni :python: :donor:<p>"And the AI should make it all quick and easy." 🙄</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Pen Test Partners<p>A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.</p><p>From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed. </p><p>They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?</p><p>This attack wasn’t subtle. But it worked because basic controls were missing. </p><p>We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.</p><p>📌<a href="https://www.pentestpartners.com/security-blog/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Alexis Brignoni :python: :donor:<p>The competent <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> examiner curse.</p><p><a href="https://infosec.exchange/tags/ScriptingHelps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScriptingHelps</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>There is no I in Team. 🤷‍♂️</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
ECS Infotech Pvt. Ltd.<p>Chip-Off Forensics in India – The Ultimate Guide!</p><p>Ever wondered how experts recover data from damaged or locked devices? Discover the power of advanced chip-off digital forensics and how it's revolutionizing data recovery &amp; mobile investigations in India.</p><p>👉 Tap the link to read the full guide! - <a href="https://bit.ly/4092fWF" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4092fWF</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://mastodon.social/tags/ChipOffForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChipOffForensics</span></a> <a href="https://mastodon.social/tags/DataRecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataRecovery</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://mastodon.social/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a> <a href="https://mastodon.social/tags/TechIndia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIndia</span></a> <a href="https://mastodon.social/tags/ForensicsExpert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForensicsExpert</span></a> <a href="https://mastodon.social/tags/DigitalInvestigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalInvestigation</span></a> <a href="https://mastodon.social/tags/TechBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechBlog</span></a> <a href="https://mastodon.social/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a></p>
Aristotelis Tzafalias<p>European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025. <br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p><p>"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"</p><p><a href="https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ec.europa.eu/transparency/expe</span><span class="invisible">rt-groups-register/screen/expert-groups/consult?lang=en&amp;groupID=4005</span></a></p>
The DFIR Report<p>Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.</p><p>🗓️ When: August 30, 2025 (14:00 – 18:00 UTC)<br>🛠️ Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.<br>🕵️ Your Squad: Form a team of 2-3 analysts.<br>🏆 The Glory: Solve the case, claim bragging rights, and win prizes for the top team!</p><p>Spaces are limited. Assemble your elite team and register now to secure your spot!</p><p>Register Here: <a href="https://dfirlabs.thedfirreport.com/dfirchallenge-enterprise-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dfirlabs.thedfirreport.com/dfi</span><span class="invisible">rchallenge-enterprise-edition</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Aristotelis Tzafalias<p>European Commission presents Roadmap for effective and lawful access to data for law enforcement - 24 June 2025<br><a href="https://home-affairs.ec.europa.eu/news/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">home-affairs.ec.europa.eu/news</span><span class="invisible">/commission-presents-roadmap-effective-and-lawful-access-data-law-enforcement-2025-06-24_en</span></a><br><a href="https://infosec.exchange/tags/dataretention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataretention</span></a> <a href="https://infosec.exchange/tags/lawfulinterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawfulinterception</span></a> <a href="https://infosec.exchange/tags/digitalforensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensics</span></a> <a href="https://infosec.exchange/tags/decryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decryption</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a></p>
Alexis Brignoni :python: :donor:<p>🧠 Understanding tool limitations is just as important and knowing tool capabilities especially when what you need to find is not there and you expected it to be.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>🧠 Understanding tool limitations is just as important and knowing tool capabilities especially when what you need to find is not there and you expected it to be.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>Sometimes you have to align it just right...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>And now a classic of the genre.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>How is productivity measured on <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a>?</p><p>Counting how many drives &amp; phones one images is not a measure of expertise or productivity.</p><p>How many cases are closed might just show you that incentivizing speed over attention to detail is a recipe for disaster long term.</p><p>How do we go about it?</p>
Alexis Brignoni :python: :donor:<p>Yup. Go figure. 😂 </p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>Techno Security &amp; Digital Forensics Conference 2025 is done! </p><p>What a great week of learning, networking, and fun. Till next year!</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>