HUB Articles

Embracing AI for a Safer Future: Revolutionising Law Enforcement with Advanced Technology

Embracing AI for a Safer Future: Revolutionising Law Enforcement with Advanced Technology

Dr. Liam Owens, Founder and CEO of Stafford-England-based Semantics 21, explores how artificial intelligence is changing the face of law enforcement. ...more

How To Article

June 26, 20244 min read

Navigating SEC Regulations In Cybersecurity And Incident Response

Navigating SEC Regulations In Cybersecurity And Incident Response

As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an ... ...more

How To Article

December 21, 20232 min read

BFU – Seeing is Believing

BFU – Seeing is Believing

This is the common reaction; a device needs extracting, and you find it in a BFU state. According to other vendors, your options are now limited. Even if you do get an extraction, it will only acquire... ...more

How To Article

December 18, 20233 min read

MediaTek: A Short Story

MediaTek: A Short Story

Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of data from any device with a MediaTek chipset. The Boot ROM is always there, and it will not change. Because of ... ...more

How To Article

October 30, 20233 min read

Cell Site Analysis: Capturing a Snapshot of the Cellular Network’s Coverage

Cell Site Analysis: Capturing a Snapshot of the Cellular Network’s Coverage

When crime scene or accident investigators examine a location, they take all the necessary measures to accurately collect, record and document the environment and characteristics, so as to have the be... ...more

How To Article

April 04, 20236 min read

Future-Proof Your Cyber Career

Future-Proof Your Cyber Career

Cyber moves fast, so staying on top of everything can be difficult to impossible at times. So, to effectively future-proof your cyber career, you can do some or all of the following things. Doing so w... ...more

How To Article

March 23, 20235 min read

3 Ways Programming Skills Can Help You Succeed in DFIR

3 Ways Programming Skills Can Help You Succeed in DFIR

I often come across this topic among those interested in digital forensics and incident response (DFIR). People seem to ask the same question – “Do I need to learn how to code?” – as if it’s a dreaded... ...more

How To Article

March 01, 20233 min read

Elevated Speed Performance with the Samsung 990 Pro

Elevated Speed Performance with the Samsung 990 Pro

Non-Volatile Memory (NVMe) storage, which Wikipedia defines as a type of computer memory that can retain stored information even after power is removed, was developed in 2009. In comparison, volatile ... ...more

How To Article

February 07, 20233 min read

Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in near... ...more

How To Article ,Hub Article

December 12, 20229 min read

Google Drive Evidence You Should Know About

Google Drive Evidence You Should Know About

As the world continues to adopt the use of cloud storage and make it a part of everyday use in personal and professional settings, you should be aware of the forensic artifacts and logs available for ... ...more

How To Article ,Hub Article

November 10, 20215 min read

Installing Autopsy on macOS Big Sur

Installing Autopsy on macOS Big Sur

Many forensic examiners and investigators are used to having resources at their place of employment to work cases. We believe the learning process never stops and no one can be an expert in everything... ...more

How To Article ,Hub Article

November 03, 20217 min read

macOS Forensic Artifacts

macOS Forensic Artifacts

It’s pretty much given that we live in a Windows-centric world. The majority of businesses and individual users out there use Windows machines to get work done. And because of that, it’s safe to say t... ...more

How To Article ,Hub Article

October 14, 20215 min read

What is Android ADB with smartphone forensics?

What is Android ADB with smartphone forensics?

There is a lot of trust put into your digital forensic tools when it comes to processing data. Many times, the “magic” of the tool remains someone unknown to the end-user. Each company claims to have ... ...more

How To Article ,Hub Article

October 12, 20214 min read

Signal App Decryption

Signal App Decryption

Signal is widely considered to be one of the most secure messaging services. Even Edward Snowden called Signal his favorite messenger app. ...more

How To Article ,Hub Article

September 14, 20217 min read

Embracing AI for a Safer Future: Revolutionising Law Enforcement with Advanced Technology

Embracing AI for a Safer Future: Revolutionising Law Enforcement with Advanced Technology

Dr. Liam Owens, Founder and CEO of Stafford-England-based Semantics 21, explores how artificial intelligence is changing the face of law enforcement. ...more

How To Article

June 26, 20244 min read

Navigating SEC Regulations In Cybersecurity And Incident Response

Navigating SEC Regulations In Cybersecurity And Incident Response

As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an ... ...more

How To Article

December 21, 20232 min read

BFU – Seeing is Believing

BFU – Seeing is Believing

This is the common reaction; a device needs extracting, and you find it in a BFU state. According to other vendors, your options are now limited. Even if you do get an extraction, it will only acquire... ...more

How To Article

December 18, 20233 min read

MediaTek: A Short Story

MediaTek: A Short Story

Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of data from any device with a MediaTek chipset. The Boot ROM is always there, and it will not change. Because of ... ...more

How To Article

October 30, 20233 min read

Cell Site Analysis: Capturing a Snapshot of the Cellular Network’s Coverage

Cell Site Analysis: Capturing a Snapshot of the Cellular Network’s Coverage

When crime scene or accident investigators examine a location, they take all the necessary measures to accurately collect, record and document the environment and characteristics, so as to have the be... ...more

How To Article

April 04, 20236 min read

Future-Proof Your Cyber Career

Future-Proof Your Cyber Career

Cyber moves fast, so staying on top of everything can be difficult to impossible at times. So, to effectively future-proof your cyber career, you can do some or all of the following things. Doing so w... ...more

How To Article

March 23, 20235 min read

3 Ways Programming Skills Can Help You Succeed in DFIR

3 Ways Programming Skills Can Help You Succeed in DFIR

I often come across this topic among those interested in digital forensics and incident response (DFIR). People seem to ask the same question – “Do I need to learn how to code?” – as if it’s a dreaded... ...more

How To Article

March 01, 20233 min read

Elevated Speed Performance with the Samsung 990 Pro

Elevated Speed Performance with the Samsung 990 Pro

Non-Volatile Memory (NVMe) storage, which Wikipedia defines as a type of computer memory that can retain stored information even after power is removed, was developed in 2009. In comparison, volatile ... ...more

How To Article

February 07, 20233 min read

Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in near... ...more

How To Article ,Hub Article

December 12, 20229 min read

Google Drive Evidence You Should Know About

Google Drive Evidence You Should Know About

As the world continues to adopt the use of cloud storage and make it a part of everyday use in personal and professional settings, you should be aware of the forensic artifacts and logs available for ... ...more

How To Article ,Hub Article

November 10, 20215 min read

Installing Autopsy on macOS Big Sur

Installing Autopsy on macOS Big Sur

Many forensic examiners and investigators are used to having resources at their place of employment to work cases. We believe the learning process never stops and no one can be an expert in everything... ...more

How To Article ,Hub Article

November 03, 20217 min read

macOS Forensic Artifacts

macOS Forensic Artifacts

It’s pretty much given that we live in a Windows-centric world. The majority of businesses and individual users out there use Windows machines to get work done. And because of that, it’s safe to say t... ...more

How To Article ,Hub Article

October 14, 20215 min read

What is Android ADB with smartphone forensics?

What is Android ADB with smartphone forensics?

There is a lot of trust put into your digital forensic tools when it comes to processing data. Many times, the “magic” of the tool remains someone unknown to the end-user. Each company claims to have ... ...more

How To Article ,Hub Article

October 12, 20214 min read

Signal App Decryption

Signal App Decryption

Signal is widely considered to be one of the most secure messaging services. Even Edward Snowden called Signal his favorite messenger app. ...more

How To Article ,Hub Article

September 14, 20217 min read