Blog by Amber Schroader & Guests
Forensic-Impact

Memory Forensics Tools Overview
Guest Blogger: Kokab RasoolMemory forensics is becoming more essential in incident response and threat analysis as new threats and sophistication arise in the changing cybersecurity landscape. Memory forensics, as opposed to traditional approaches that rely on hard...

Unmasking Fake Emails: Essential Techniques for Email Analysis
Guest Blogger: Shatabdi MalikIn today's digital age, emails are a prime target for scammers and cybercriminals. Identifying fake emails is crucial to protect yourself and your organization. Here's a straightforward guide on how to spot suspicious emails and ensure...

TikTok Compliance Data Your New BFF
Haven't heard of TikTok? Then you might have been living under a rock (or maybe just enjoying some serious digital detox!). TikTok is one of the world's most popular social media platforms, where users share short-form, often viral videos, featuring dance challenges,...

OSINT Tools And Techniques for Digital Forensics Nerds
Written by: Stephanie HonoreIntroduction As a professional software engineer with a passion for digital forensics, I often find myself drawn to unraveling the complexities of cyber threats in my spare time. With a background in building eDiscovery software and some...