Become a Member to access our Premium Content
Briefing Centre
Using Mobile Device Geodata to Confirm Location
Mobile device geolocation has become a critical evidential source in digital investigations. This briefing examines how smartphones determine location using GNSS, cellular networks, Wi-Fi, and device sensors. It explores the reliability of these technologies, the risks of spoofing and manipulation, and how investigators can validate location data through multi-source correlation and forensic analysis to strengthen evidential confidence.
DFM Briefing on the UK Forensic Science Regulator Guidance [GUI-0004]
FSR-GUI-0004 sets clear expectations for how forensic evidence should be interpreted and communicated within the Criminal Justice System. This briefing explains the guidance’s scope, regulatory intent, and practical requirements, including evaluative reasoning, likelihood ratios, bias control, and competence. It assesses implications for digital forensics and incident response, highlighting operational challenges, risks, and areas where implementation discipline will determine credibility outcomes.
The UK Government Cyber Action Plan (2026): A Structural Reset for Cyber Governance — Credibility, Deliverability, and the Risks That Remain
The UK Government Cyber Action Plan (2026) marks a decisive shift from advisory cyber policy to enforceable, cross-government governance. It introduces a central risk “spine” within DSIT, clarifies accountability for departments and suppliers, and reframes outages and attacks as equivalent resilience failures. This briefing assesses credibility, deliverability, skills and industry reliance, legislative dependencies, and the unanswered questions that will determine success.
Geopolitical Shock Events and Cyber Spillover Risk – Implications for Digital Investigations and the Wider Cyber Domain (Iran/IRGC Turbulence and U.S. Military Action in Venezuela)
This DFM Briefing examines how concurrent geopolitical shock events involving Iran, the IRGC, and U.S. military action in Venezuela reshape the cyber threat landscape. It analyses implications for digital investigations, attribution, evidence integrity, and DFIR operations, highlighting heightened cyber noise, influence operations, and the growing risk of evidence pollution in politically contested environments.
News Centre
NEWS ROUNDUP – 7th April 2026
This edition tracks a cloud-breach attribution at the European Commission, emergency remediation for actively exploited FortiClient EMS systems, and CISA action on a TrueConf flaw. It also covers a cyberattack on a Massachusetts emergency communications centre, Microsoft’s warning on fast-moving Medusa intrusions, and Cambodia’s new cybercrime law aimed at scams, laundering, recruitment, and illicit data handling.
NEWS ROUNDUP – 3rd April 2026
CISA flagged active exploitation of a Langflow flaw, while researchers warned ShareFile bugs can deliver unauthenticated remote code execution. Mercor confirmed fallout from the LiteLLM supply-chain compromise, Hasbro investigated unauthorized network access, and CERT-EU widened the scope of the Europa platform breach. Policy and standards developments also moved, from China’s digital-human draft rules to ENISA’s digital wallet certification work effort.
NEWS ROUNDUP – 1st April 2026
Europe’s Commission disclosed data theft from cloud infrastructure, while CISA ordered urgent Citrix patching for active exploitation. U.S. prosecutors charged a suspect over the $50 million Uranium Finance hacks, and researchers linked the axios npm supply-chain compromise to North Korean actors. The roundup also tracks UK scam-centre sanctions, Italy’s Intesa breach fine, and Lloyds’ mobile banking data exposure this week.
NEWS ROUNDUP – 30th March 2026
F5 BIG-IP exploitation escalated after a flaw was reclassified to critical RCE, while a Fortinet FortiClient EMS bug also came under active attack. The European Commission confirmed a data breach after the Europa web platform incident, and UK sanctions targeted infrastructure tied to Cambodia-based scam operations. NCA’s 2026 assessment also linked cybercrime more closely with wider organised offending patterns overall.
Latest Blog
Call for Nominations – 2026 US OSPAs
Nominations are now open for the 2026 US Outstanding Security Performance Awards (OSPAs), recognising excellence across the global security profession. Open to individuals, teams, and organisations, the awards highlight innovation, leadership, and measurable achievement across the sector. With national winners progressing to global recognition, the programme offers a valuable opportunity to showcase professional success and industry leadership.
Mobile Money
Africa’s rapid adoption of mobile money is reshaping the digital economy, expanding financial inclusion while introducing new security and compliance challenges. This article explores the role of PCI DSS in cloud environments, fintech innovation across Africa, and how artificial intelligence is transforming fraud detection, customer experience, and trust in digital payment ecosystems.
UK Acts on Weak Link in Modern Infrastructure
The UK is strengthening national resilience by overhauling its Positioning, Navigation and Timing (PNT) infrastructure—vital for transport, energy, finance and digital services. With rising threats from GNSS jamming, spoofing and electronic warfare, the UK is shifting to a layered, secure PNT architecture to protect critical systems and ensure continuity across the modern digital economy.
When AI Becomes the Hacker
The first fully autonomous AI-driven cyber-espionage campaign marks a turning point in national-level cyber operations. Anthropic’s investigation into the state-aligned GTG-1002 group reveals how AI executed up to 90% of the intrusion lifecycle—reconnaissance, exploitation, lateral movement, and data theft—at machine speed. DFIR teams now face a new era of AI-orchestrated, high-velocity attacks.