Become a Member to access our Premium Content
Briefing Centre
Using Mobile Device Geodata to Confirm Location
Mobile device geolocation has become a critical evidential source in digital investigations. This briefing examines how smartphones determine location using GNSS, cellular networks, Wi-Fi, and device sensors. It explores the reliability of these technologies, the risks of spoofing and manipulation, and how investigators can validate location data through multi-source correlation and forensic analysis to strengthen evidential confidence.
DFM Briefing on the UK Forensic Science Regulator Guidance [GUI-0004]
FSR-GUI-0004 sets clear expectations for how forensic evidence should be interpreted and communicated within the Criminal Justice System. This briefing explains the guidance’s scope, regulatory intent, and practical requirements, including evaluative reasoning, likelihood ratios, bias control, and competence. It assesses implications for digital forensics and incident response, highlighting operational challenges, risks, and areas where implementation discipline will determine credibility outcomes.
The UK Government Cyber Action Plan (2026): A Structural Reset for Cyber Governance — Credibility, Deliverability, and the Risks That Remain
The UK Government Cyber Action Plan (2026) marks a decisive shift from advisory cyber policy to enforceable, cross-government governance. It introduces a central risk “spine” within DSIT, clarifies accountability for departments and suppliers, and reframes outages and attacks as equivalent resilience failures. This briefing assesses credibility, deliverability, skills and industry reliance, legislative dependencies, and the unanswered questions that will determine success.
Geopolitical Shock Events and Cyber Spillover Risk – Implications for Digital Investigations and the Wider Cyber Domain (Iran/IRGC Turbulence and U.S. Military Action in Venezuela)
This DFM Briefing examines how concurrent geopolitical shock events involving Iran, the IRGC, and U.S. military action in Venezuela reshape the cyber threat landscape. It analyses implications for digital investigations, attribution, evidence integrity, and DFIR operations, highlighting heightened cyber noise, influence operations, and the growing risk of evidence pollution in politically contested environments.
News Centre
NEWS ROUNDUP – 23rd March 2026
Google reported access-to-operator handoffs dropping to 22 seconds, while Trio-Tech disclosed ransomware at its Singapore unit and Oracle shipped an emergency patch for a critical Fusion Middleware flaw. Europol said 373,000 dark web sites were shut down, and U.S. authorities sentenced facilitators tied to North Korean remote-worker infiltration and a separate business email compromise scheme targeting victims across borders globally.
NEWS ROUNDUP – 20th March 2026
Microsoft Intune hardening guidance followed the Stryker breach, while ConnectWise patched a critical ScreenConnect flaw. Investigators tied Russian operations to a Zimbra breach and iPhone exploitation in Ukraine. Europol’s Operation Alice shuttered 373,000 dark-web sites, CISA flagged active SharePoint exploitation, and NIST issued final guidance on secure DNS deployment and 5G security design.
NEWS ROUNDUP – 18th March 2026
Intuitive disclosed a phishing-linked breach of internal business applications, CISA added a Wing FTP flaw to its exploited catalog, and investigators traced GlassWorm fallout into compromised GitHub-hosted Python repositories. INTERPOL warned that AI-enhanced financial fraud is scaling globally, while NIST advanced cryptographic validation automation and the UK ICO pressed technology firms to strengthen age checks and protect children’s data better.
NEWS ROUNDUP – 16th March 2026
Poland’s nuclear research centre blocked a cyberattack while Albania’s parliament isolated email systems during a separate incident. The FBI is tracing victims linked to malware distributed through Steam games, and U.S. prosecutors allege a responder assisted BlackCat ransomware actors. Telus and Stryker reported cyber disruptions, while authorities dismantled the SocksEscort proxy service and INTERPOL seized 45,000 malicious IPs.
Latest Blog
Mobile Money
Africa’s rapid adoption of mobile money is reshaping the digital economy, expanding financial inclusion while introducing new security and compliance challenges. This article explores the role of PCI DSS in cloud environments, fintech innovation across Africa, and how artificial intelligence is transforming fraud detection, customer experience, and trust in digital payment ecosystems.
UK Acts on Weak Link in Modern Infrastructure
The UK is strengthening national resilience by overhauling its Positioning, Navigation and Timing (PNT) infrastructure—vital for transport, energy, finance and digital services. With rising threats from GNSS jamming, spoofing and electronic warfare, the UK is shifting to a layered, secure PNT architecture to protect critical systems and ensure continuity across the modern digital economy.
When AI Becomes the Hacker
The first fully autonomous AI-driven cyber-espionage campaign marks a turning point in national-level cyber operations. Anthropic’s investigation into the state-aligned GTG-1002 group reveals how AI executed up to 90% of the intrusion lifecycle—reconnaissance, exploitation, lateral movement, and data theft—at machine speed. DFIR teams now face a new era of AI-orchestrated, high-velocity attacks.
UK Appoints Its First Fraud Minister
The UK’s first Fraud Minister marks a decisive shift in tackling the nation’s fastest-growing crime. With rising digital scams, cross-border criminal networks, and fragmented data sharing, Lord Hanson’s three-year strategy aims to realign incentives, strengthen real-time intelligence, and restore the UK’s leadership in fraud prevention. Success now depends on rapid coordination across banks, telecoms, social platforms and law enforcement.