Friday, October 24 2025

Investigating The Digital World

Become a Member to access our Premium Content

Issue 55 – Out Now

Descriptive alt text

HOW THE METAVERSE IS CHALLENGING FORENSIC INVESTIGATION

The Metaverse is a phenomenon that is rapidly evolving and taking shape as a services platform and mediating ecosystem for human computer interaction. It currently has an abstract and incoherent profile that challenges human imagination to visualise what is socially, technically, and commercially viable. It opens technology experiences for futures speculation and exploration of what can be done better. The utopia is to deliver a seamless and encapsulating human life experience that has no negative impacts and a strong sense of personal wellbeing.

VISUALISING IOT/IIOT DATA WITH RECHARTS & INFLUXDB

IoT Data may be harvested from a wide range of sensors used in manufacturing infrastructure, weather stations, smart meters, cars, fridges, and many other devices. All this data has to be processed in order to make one interpretable data feed. This subsequent data feed will then help with reverse engineering and failure prediction. In this article we develop a visualisation platform that will display disparate IoT data for further analysis and the two technologies we will primarily be using are ‘React’ and ‘InfluxDB’.

DEFENDING RAIL INFRASTRUCTURE – LIVE FIRE EXERCISE

The UK-run Exercise DEFENCE CYBER MARVEL (Ex DCM) series are cyber exercises like no other. While the organisers, planners and participants are predominantly members of the British Army’s Royal Corps of Signals, the exercise brings together people across UK Government, Defence, Reservists, Critical National Infrastructure (CNI) and international industry to plan and execute a unique event for 39 teams from Defence (including Regular, Reserve and Civil Service personnel), Government and 15 partner nations, participating from over 12 countries, including 15 teams in Tallinn. This article was written in collaboration with the Royal Corps of Signals. Typically, government and Defence led cyber exercises are capture the flag (CTF) challenges more akin to a pub quiz than a bar brawl, and even ‘live fire’ cyber exercises tend to be straight-faced affairs with ‘Blue Teams’ (BT) defending their respective networks against a closely controlled ‘Red Team’ (RT).

CRACKING THE FORENSIC INVESTIGATIONS IN THE DIGITAL AGE

While it may not seem like the technology landscape was all that different in 2014 versus today, consider the sheer magnitude of innovation that’s since transpired. Back then, shooting HD video on the iPhone had only recently been introduced, onboard storage options maxed out at 64GB, automated cloud backup services like iCloud were still in their infancy, and social media platforms like Facebook and Instagram were still primarily limited to photos and text. These days, we can buy phones that can record in 8k and can store up to 1TB of data, that seamlessly integrate with a multitude of cloud services to ensure we never lose our data, and can document our lives in vivid detail using an assortment of multimedia formats across a growing expanse of mobile apps.

INVESTIGATORS IN DANGER

While data leaks and breaches are a serious issue for any organisation, for digital forensic teams it presents an even more consequential risk. Due to the sensitive work undertaken by police and other public sector bodies, especially in areas such as Northern Ireland, where assaults on police reached a five-year-high in 2023, data leaks can leave staff, victims, witnesses and even perpetrators in significant danger. This risk is heightened further when you consider the type of work these teams do. As part of their responsibilities, digital forensic investigators will often be handling devices containing material of unknown origin and intent. On top of this, as part of their investigations, they can be required to visit areas of the web which are unsecured, or access attachments and files which could contain malware or other malicious payloads.

Plus all the regular features…

Read Now

Briefing Papers

Briefing: NAO “Overview of the Home Office 2024–25”

09/10/2025

NAO’s Home Office 2024–25 overview highlights digital transformation and elevated risks for investigations. LEDS and HOB migrations, Hendon data-centre exit, and ESN delays affect evidence integrity and incident communications. Principal risks—cyber threats, data quality, and insider activity—demand stronger governance, forensic readiness, and skills. Recommendations: standardised toolsets, AI governance, immutable logging, dual-running comms, and whole-system cyber exercises across forces and departments.

Continue Reading

Satellite Warfare – An Analysis

04/10/2025

Space has become a critical domain for national security, commerce, and communication. As global satellite networks expand, so do the risks of interference, cyber intrusion, and orbital conflict. This analysis explores the balance between offence, defence, and digital forensics, highlighting the urgent need for resilience, forensic readiness, and international cooperation in securing space infrastructure.

Continue Reading

Latest News

NEWS ROUNDUP – 24th October 2025

24/10/2025

CISA issues new ICS advisories, Pwn2Own researchers reveal 34 zero-days, and Microsoft warns of AI-driven cyberattacks. Global investigations continue into SharePoint ToolShell exploitation and healthcare data breaches. Law enforcement seizes $14 billion in cryptocurrency, while NIST and ISO release new cybersecurity standards shaping compliance, risk management, and DFIR priorities for enterprises worldwide.

Continue Reading

NEWS ROUNDUP – 22nd October 2025

22/10/2025

Global DFIR highlights include 34 zero-days chained at Pwn2Own Ireland and active Oracle E-Business Suite exploitation confirmed by CISA. Microsoft detailed Blob Storage attack chains, while Muji and Verisure faced major breaches. UK police secured major online abuse convictions. NIST and the EU advanced supply-chain and cybersecurity certification initiatives, signalling rising compliance expectations.

Continue Reading

NEWS ROUNDUP – 20th October 2025

20/10/2025

Envoy Air and Prosper breaches dominate this 48-hour cycle, alongside China’s cyber-espionage allegations against the U.S. and new F5 patches issued after a major breach. GDPR enforcement, sanctions on scam networks, and NCSC’s annual review add regulatory weight. DFIR teams face converging challenges across extortion, compliance, and state-linked threat activity.

Continue Reading

NEWS ROUNDUP – 17th October 2025

17/10/2025

Microsoft dismantles Rhysida ransomware infrastructure and CISA issues 13 new ICS advisories, while breaches hit Sotheby’s and Malaysia’s Regency Hospital. California enforces a 30-day breach notification rule as ISO refreshes privacy standards. DFIR teams face renewed scrutiny of trust stores, industrial systems, and rapid-response readiness amid tightening global regulatory and law-enforcement actions.

Continue Reading

Latest Blog Articles

The Red Hat Consulting Breach – An Analysis

07/10/2025

The breach of Red Hat Consulting’s private GitLab exposed hundreds of customers to a cascade of risk. This was not a product flaw, but a failure in third-party security hygiene. Stolen Customer Engagement Reports (CERs) containing network blueprints and live credentials transform this incident into a weapon, forcing enterprises to urgently audit their third-party access and secrets management.

Continue Reading

Crisis communication and real-world harm after security incidents

03/10/2025

Silence after a crisis is never neutral. This analysis of Southport and Liverpool shows how delays in communication fuel rumours, conspiracy theories, and unrest, while timely, transparent disclosure can contain escalation. For DFIR teams, the lesson is clear: strategic, evidence-based communication is as vital as technical response in safeguarding trust.

Continue Reading