Digital Forensics Round-Up, September 10 2025
forensicfocus.com·2d
🔍Audio Forensics
What is HIPAA Compliance? A Complete Guide
securityscorecard.com·1h
⚖️Legal Compliance
Cracking Forensics CTFs 1.0 — picoCTF
infosecwriteups.com·16h
🔍Binary Forensics
Waymo Tells Cops: ‘Get A Warrant’
techdirt.com·19h·
Discuss: Hacker News
⚖️Legal Compliance
Why sandboxing matters now — and how to choose one that gives you facts, not fiction
vmray.com·2d
🔒WASM Capabilities
How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials
security.googleblog.com·2d·
🎬WebCodecs
'Large' brief of evidence against childcare worker accused of child abuse material
abc.net.au·21h
🚨Incident Response
Software Bill of Materials Requirements in DoD and Federal Guidance
eclypsium.com·5h·
Discuss: Hacker News
🔒WASM Capabilities
From Fitbit to financial despair: How one woman lost her life savings and more to a scammer
malwarebytes.com·6h
🎫Kerberos Attacks
Judge releases redacted document used to justify search of John Bolton's home
the-independent.com·2h
🗜️ZIP Forensics
Why (special agent) Johnny (still) Can't Encrypt (2011)
mattblaze.org·2h·
Discuss: Lobsters
🌊Stream Ciphers
Eric Schoedon – Certified Expert In IT, Automotive Engineering, And Emerging Forensic Technologies
forensicfocus.com·1d
🔬Hardware Forensics
Digital Addiction Among Arab Families: Status, Contributing Factors, Responsibilities, and Solutions
cacm.acm.org·5h
🎯Threat Hunting
VPNs and Age-Verification Laws: What You Need to Know
wired.com·10h·
Discuss: r/technews
🧅Tor Networks
Secure QKD Network Resilience via Dynamic Threshold-Adaptive Key Reconciliation
dev.to·11h·
Discuss: DEV
🔐Quantum Cryptography
NEWS ROUNDUP – 12th September 2025
digitalforensicsmagazine.com·7h
🔗Data Provenance
From Physical Archives to Digital Preservation: Reflecting on a Forty-Year Transformation
dpconline.org·2d
🌐Archive Networks
Justice Ministry: New liability rules set for software and AI product makers
heise.de·1d
🔓Open Source Software
Felon arrested, drugs and cash seized Thursday in Dublin
mercurynews.com·16h
🧠Memory Forensics
You’re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.com·8h
🎫Kerberos Attacks