Subscribe or login to read our latest issue and access our other features
HOW THE METAVERSE IS CHALLENGING FORENSIC INVESTIGATION
The Metaverse is a phenomenon that is rapidly evolving and taking shape as a services platform and mediating ecosystem for human computer interaction. It currently has an abstract and incoherent profile that challenges human imagination to visualise what is socially, technically, and commercially viable. It opens technology experiences for futures speculation and exploration of what can be done better. The utopia is to deliver a seamless and encapsulating human life experience that has no negative impacts and a strong sense of personal wellbeing. It has the financial backing from big investors, and the pent-up rage of dissatisfied technology users to drive the innovation in which and whatever ways it may evolve. The potential is for the Metaverse to sweep up all current technologies (Internet, Cloud, Blockchain, IoT, Games, AI, FINTEC, and so on) to facilitate all human service requirements into the new construct. This makes it an interesting ecosystem for Digital Investigations.
VISUALISING IOT/IIOT DATA WITH RECHARTS & INFLUXDB
IoT Data may be harvested from a wide range of sensors used in manufacturing infrastructure, weather stations, smart meters, cars, fridges, and many other devices. All this data has to be processed in order to make one interpretable data feed. This subsequent data feed will then help with reverse engineering and failure prediction. In this article we develop a visualisation platform that will display disparate IoT data for further analysis and the two technologies we will primarily be using are ‘React’ and ‘InfluxDB’.
DEFENDING RAIL INFRASTRUCTURE - LIVE FIRE EXERCISE
The UK-run Exercise DEFENCE CYBER MARVEL (Ex DCM) series are cyber exercises like no other. While the organisers, planners and participants are predominantly members of the British Army’s Royal Corps of Signals, the exercise brings together people across UK Government, Defence, Reservists, Critical National Infrastructure (CNI) and international industry to plan and execute a unique event for 39 teams from Defence (including Regular, Reserve and Civil Service personnel), Government and 15 partner nations, participating from over 12 countries, including 15 teams in Tallinn. This article was written in collaboration with the Royal Corps of Signals. Typically, government and Defence led cyber exercises are capture the flag (CTF) challenges more akin to a pub quiz than a bar brawl, and even ‘live fire’ cyber exercises tend to be straight-faced affairs with ‘Blue Teams’ (BT) defending their respective networks against a closely controlled ‘Red Team’ (RT). This does not discount the value of these training methods: CTFs are renowned for their challenge with each ‘flag’ acting as proof of a team’s technical acumen, and closely controlled ‘live fire’ exercises enable a fair and objective assessment of BTs as they train how they fight.
CRACKING THE FORENSIC INVESTIGATIONS IN THE DIGITAL AGE
While it may not seem like the technology landscape was all that different in 2014 versus today, consider the sheer magnitude of innovation that’s since transpired. Back then, shooting HD video on the iPhone had only recently been introduced, onboard storage options maxed out at 64GB, automated cloud backup services like iCloud were still in their infancy, and social media platforms like Facebook and Instagram were still primarily limited to photos and text. These days, we can buy phones that can record in 8k and can store up to 1TB of data, that seamlessly integrate with a multitude of cloud services to ensure we never lose our data, and can document our lives in vivid detail using an assortment of multimedia formats across a growing expanse of mobile apps.
INVESTIGATORS IN DANGER
While data leaks and breaches are a serious issue for any organisation, for digital forensic teams it presents an even more consequential risk. Due to the sensitive work undertaken by police and other public sector bodies, especially in areas such as Northern Ireland, where assaults on police reached a five-year-high in 2023, data leaks can leave staff, victims, witnesses and even perpetrators in significant danger. This risk is heightened further when you consider the type of work these teams do. As part of their responsibilities, digital forensic investigators will often be handling devices containing material of unknown origin and intent. On top of this, as part of their investigations, they can be required to visit areas of the web which are unsecured, or access attachments and files which could contain malware or other malicious payloads.
Plus all the regular features...
Latest News
NEWS ROUNDUP – 29th September 2025
Over the past 48 hours, DFIR teams faced active Cisco zero-day exploitation, evolving macOS XCSSET tactics, and BRICKSTORM espionage. Aviation operations suffered vendor software disruption; Harrods reported a third-party breach. INTERPOL announced 260 arrests targeting sextortion scams, and the NCA detained a UK suspect. CISA issued an emergency directive; NIST published compliance updates. Organisations should prioritise patching and secure-boot verification.
Continue ReadingNEWS ROUNDUP – 24th September 2025
Airports across Europe faced major disruption after a third-party ransomware attack, while Jaguar Land Rover extended shutdowns from a cyber incident. Boyd Gaming also reported employee data theft. CISA flagged active Chrome zero-day exploitation, and SolarWinds issued a third patch for a critical flaw. Regulators tightened GDPR fines guidance, and UK police made an arrest.
Continue ReadingNEWS ROUNDUP – 22 September 2025
In the last 48 hours, global cyber events highlighted vendor risk and operational fragility. European airports and Jaguar Land Rover faced major disruptions from supply-chain compromises, while schools in Texas and US agencies managed ransomware recoveries. Threat actors exploited WatchGuard Firebox flaws and posted new ransomware victims. Policymakers reinforced third-party accountability as investigations deepened.
Continue ReadingNEWS ROUNDUP – 19th September 2025
Across the past 48 hours, DFIR teams tackled Uvalde CISD’s ransomware fallout and major healthcare disclosures, while Google patched an actively exploited Chrome zero-day. Law enforcement advanced cases tied to the TfL intrusion and broader critical-infrastructure attacks. Policy and standards moved too, with the UK’s Cyber Growth Action Plan and new NIST guidance on KEMs and TLS 1.3 visibility initiatives.
Continue ReadingLatest Blog Articles
Cloud Risks in Space: Securing the Ground Segment in a Cloud-First Era
The space sector is undergoing a transformation. Cloud computing is rapidly reshaping how satellites are controlled and managed on the ground, with Ground Station/Segment as a Service (GSaaS) emerging as a cost-effective, scalable alternative to traditional infrastructure.
Continue ReadingUK Digital Identity Trust Framework Gamma (0.4): What You Need to Know
UK Digital Identity Trust Framework Gamma (0.4): What You Need to Know On 1 July 2025, the UK Digital Identity and Attributes Trust Framework – Gamma (0.4) comes into force. This update builds on the alpha and beta versions and […]
Continue ReadingThe Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations Executive Summary The UK’s Cyber Assessment Framework (CAF) version 4.0 introduces structured practices that directly strengthen digital investigations. By focusing on monitoring, logging, incident response, and post-incident learning, CAF […]
Continue ReadingCommercial Offensive Cyber Capabilities: Red-Team Focus and What It Means for Digital Investigations
Commercial Offensive Cyber Capabilities: Red-Team Focus and What It Means for Digital Investigations Published: August 2025 Summary of the UK Government Report The UK Department for Science, Innovation and Technology (DSIT) recently published a study on Commercial Offensive Cyber Capabilities: […]
Continue Reading