Become a Member to access our Premium Content
HOW THE METAVERSE IS CHALLENGING FORENSIC INVESTIGATION
The Metaverse is a phenomenon that is rapidly evolving and taking shape as a services platform and mediating ecosystem for human computer interaction. It currently has an abstract and incoherent profile that challenges human imagination to visualise what is socially, technically, and commercially viable. It opens technology experiences for futures speculation and exploration of what can be done better. The utopia is to deliver a seamless and encapsulating human life experience that has no negative impacts and a strong sense of personal wellbeing.
VISUALISING IOT/IIOT DATA WITH RECHARTS & INFLUXDB
IoT Data may be harvested from a wide range of sensors used in manufacturing infrastructure, weather stations, smart meters, cars, fridges, and many other devices. All this data has to be processed in order to make one interpretable data feed. This subsequent data feed will then help with reverse engineering and failure prediction. In this article we develop a visualisation platform that will display disparate IoT data for further analysis and the two technologies we will primarily be using are ‘React’ and ‘InfluxDB’.
DEFENDING RAIL INFRASTRUCTURE – LIVE FIRE EXERCISE
The UK-run Exercise DEFENCE CYBER MARVEL (Ex DCM) series are cyber exercises like no other. While the organisers, planners and participants are predominantly members of the British Army’s Royal Corps of Signals, the exercise brings together people across UK Government, Defence, Reservists, Critical National Infrastructure (CNI) and international industry to plan and execute a unique event for 39 teams from Defence (including Regular, Reserve and Civil Service personnel), Government and 15 partner nations, participating from over 12 countries, including 15 teams in Tallinn. This article was written in collaboration with the Royal Corps of Signals. Typically, government and Defence led cyber exercises are capture the flag (CTF) challenges more akin to a pub quiz than a bar brawl, and even ‘live fire’ cyber exercises tend to be straight-faced affairs with ‘Blue Teams’ (BT) defending their respective networks against a closely controlled ‘Red Team’ (RT).
CRACKING THE FORENSIC INVESTIGATIONS IN THE DIGITAL AGE
While it may not seem like the technology landscape was all that different in 2014 versus today, consider the sheer magnitude of innovation that’s since transpired. Back then, shooting HD video on the iPhone had only recently been introduced, onboard storage options maxed out at 64GB, automated cloud backup services like iCloud were still in their infancy, and social media platforms like Facebook and Instagram were still primarily limited to photos and text. These days, we can buy phones that can record in 8k and can store up to 1TB of data, that seamlessly integrate with a multitude of cloud services to ensure we never lose our data, and can document our lives in vivid detail using an assortment of multimedia formats across a growing expanse of mobile apps.
INVESTIGATORS IN DANGER
While data leaks and breaches are a serious issue for any organisation, for digital forensic teams it presents an even more consequential risk. Due to the sensitive work undertaken by police and other public sector bodies, especially in areas such as Northern Ireland, where assaults on police reached a five-year-high in 2023, data leaks can leave staff, victims, witnesses and even perpetrators in significant danger. This risk is heightened further when you consider the type of work these teams do. As part of their responsibilities, digital forensic investigators will often be handling devices containing material of unknown origin and intent. On top of this, as part of their investigations, they can be required to visit areas of the web which are unsecured, or access attachments and files which could contain malware or other malicious payloads.
Plus all the regular features…
Briefing Papers
Cyber Security and Resilience Bill: Beyond Cyber
The Cyber Security and Resilience Bill modernises the UK’s NIS framework but remains heavily cyber-centric. This briefing argues that true national resilience depends on recognising data centres, utilities, ports and other CNI as cyber-physical systems. Protecting the digital built environment—power, cooling, OT, building services and engineering systems—is essential, with RSES offering a key competence pathway.
Continue ReadingCyber Security and Resilience Bill: A Comprehensive Review of the UK’s Next-Generation Cyber Law
The Cyber Security and Resilience Bill modernises the UK’s NIS framework, expanding obligations across essential services, cloud platforms, MSPs and critical suppliers. This briefing explores the Bill’s scope, enforcement powers, industry pushback, and its implications for regulators, government, consumers, and the DFIR community—highlighting how the legislation could reshape national cyber-resilience for years ahead.
Continue ReadingIndependent Research on the Economic Impact of Cyber Attacks on the UK
The Department for Science, Innovation and Technology (DSIT) commissioned new research quantifying the true cost of cyber attacks on the UK economy. This DFM briefing analyses findings across business, consumer, and infrastructure impacts—revealing how cyber incidents now represent a measurable drag on national productivity, competitiveness, and long-term economic resilience.
Continue ReadingDigital Forensics in UK Law Enforcement: Productivity, Pressure, and the Path Ahead
Digital forensics in UK law enforcement stands at a turning point. The National Audit Office’s 2025 Police Productivity report exposes rising digital demand, fragmented governance, and critical skills shortages. This briefing analyses the findings, links them to forensic capability and reform, and outlines how national standardisation could transform police productivity and justice outcomes.
Continue ReadingLatest News
NEWS ROUNDUP – 12th November 2025
The latest 48-hour global cybersecurity roundup covers ongoing fallout from Oracle E-Business Suite exploitation, new Microsoft Patch Tuesday detections, CISA’s KEV update, and the UK’s proposed Cyber Security and Resilience Bill. It highlights data-breach disclosures, evolving policy frameworks, and cross-sector responses that matter most to DFIR and cyber-risk professionals worldwide.
Continue ReadingNEWS ROUNDUP – 10th November 2025
Over the past 48 hours, global cybersecurity saw major Oracle E-Business Suite breaches, new ransomware claims, and critical container runtime exploits. India expanded cyber-fraud crackdowns, Ghana deepened cross-border cooperation, and Morocco launched AI-driven dark-web monitoring. DFIR teams face sustained ERP targeting, evolving regulations, and rising enforcement intensity across finance, government, and critical digital infrastructure.
Continue ReadingNEWS ROUNDUP – 7th November 2025
Global coverage from 05–07 Nov 2025: SonicWall attributes its breach to a state-backed actor, while the Washington Post confirms exposure via Oracle-linked software. Android’s “Landfall” spyware zero-day and Monsta FTP RCE headline new exploits. ENISA warns of DDoS waves on public services as CISA releases fresh ICS advisories and NCSC announces Mail/Web Check retirement.
Continue ReadingNEWS ROUNDUP – 5th November 2025
The past 48 hours saw major movement across global cyber fronts, including AI-enabled backdoors, cargo-theft hacking campaigns, and high-impact data breaches in Japan and Sweden. Actively exploited WordPress and Android vulnerabilities demand immediate patching, while new CISA KEVs and ICS advisories raise urgency for OT environments. Meanwhile, Europol operations disrupted large-scale fraud and crypto-platform crime.
Continue ReadingLatest Blog Articles
NCSC Annual Review 2025
The NCSC Annual Review 2025 highlights a decisive year for UK cyber resilience, with record incident volumes and major strides in AI security, critical supplier oversight, and automation. Yet ransomware and supply-chain vulnerabilities persist. For DFIR professionals, the Review underscores urgency around governance accountability, rapid patching, dependency mapping, and post-quantum preparedness across critical national sectors.
Continue ReadingThe Red Hat Consulting Breach – An Analysis
The breach of Red Hat Consulting’s private GitLab exposed hundreds of customers to a cascade of risk. This was not a product flaw, but a failure in third-party security hygiene. Stolen Customer Engagement Reports (CERs) containing network blueprints and live credentials transform this incident into a weapon, forcing enterprises to urgently audit their third-party access and secrets management.
Continue ReadingCrisis communication and real-world harm after security incidents
Silence after a crisis is never neutral. This analysis of Southport and Liverpool shows how delays in communication fuel rumours, conspiracy theories, and unrest, while timely, transparent disclosure can contain escalation. For DFIR teams, the lesson is clear: strategic, evidence-based communication is as vital as technical response in safeguarding trust.
Continue ReadingCloud Risks in Space: Securing the Ground Segment in a Cloud-First Era
The space sector is undergoing a transformation. Cloud computing is rapidly reshaping how satellites are controlled and managed on the ground, with Ground Station/Segment as a Service (GSaaS) emerging as a cost-effective, scalable alternative to traditional infrastructure.
Continue Reading