News / Events
DFIR Stream 0xD announced "Cybersecurity & Open Source Policy" by Daniel Appelquist, Samsung Electronics.
Dan will discuss the importance of open-source security for the essential digital infrastructure we all rely on. He will explore initiatives by organizations like OpenSSF to enhance open-source security and explain how these efforts integrate with emerging regulatory frameworks. Read More
DFIR Stream 0xC announced "Responsible AI and Cross-Border Compliance for Global Business" by Dr. Engr. Muslim Jameel Syed, Atlantic Technological University.
Artificial Intelligence (AI) is transforming industries but raises ethical and regulatory concerns, from bias and privacy issues to compliance challenges. This talk explores the history of AI, the pitfalls of current approaches, and the urgent need for responsible AI—emphasizing ethics, transparency, and accountability. We’ll discuss the EU AI Act, cross-border compliance frameworks, and practical steps for small and medium enterprises (SMEs) to adopt AI responsibly. Read More
UK Researchers Uncover Critical Security Flaws in Widely Used Educational Lab Software.
In a major advancement towards securing UK educational bodies from cyber attacks, the Pentester Stream Lab, alongside students from the Cyber Metropolitan Community at London Metropolitan University, has uncovered several critical vulnerabilities in a widely used third-party laboratory management service. Read More
DFIR Stream 0xB announced "Cybercrime Landscape in 2024." by Stephanie Corvese, Grant Thornton LLP.
In today's digital age, cyber threats have become increasingly sophisticated and widespread. With years of experience in cybersecurity, Stephanie will explore the various types of cybercrime that pose risks to individuals and organizations alike. From traditional malware and phishing attacks to advanced ransomware and AI-powered exploits, understanding these threats is crucial. We'll delve into the profiles of threat actors, including solo hackers, organized cybercriminal groups, nation-states, and hacktivists, each operating with distinct motives and methods. Read More
DFIR Stream 0xA announced "How to Detect when Residential IP Proxies are Used as a Botnet" by Dr. Elisa Chiapponi, Amadeus IT Group.
This talk will cover the RESIP detection technique based on Round Trip Time (RTT) measurements. We present the successful results obtained from applying this technique in both semi-controlled and real-world scenarios. In the second part of the presentation, we reveal new insights into RESIP inner functioning and modus operandi. We present the similarities and differences of the ecosystems associated with four RESIP providers (geographic distribution, types, and management of machines used). Read More
DFIR Stream 0x9 announced "Low-Level Hardware Information Assisted Approach Towards System Security" by Dr. Chen Liu, Clarkson University.
In this talk, Dr. Liu will share his thoughts on the detection of different attacks through modeling the execution behavior of an application using low-level hardware information. Dr. Liu's approaches can provide more flexibility for detection schemes by performing dynamic behavioral analysis at run-time. With anomaly detection methods, the abnormal behaviors that deviate from benign behaviors at run-time can be flagged and captured. Read More
DFIR Stream 0x8 announced "Malware Detection in Memory Forensics: Open Challenges and Issues" by Dr. Ricardo J. Rodríguez, University of Zaragoza.
This talk will cover the malware analysis process applied to memory forensic science and the current problems and open challenges faced during this process, presenting the latest advances made by his research group in this area. In particular, Dr. Rodríguez will show how the memory acquisition and analysis process is performed on a memory dump. Read More
DFIR Stream 0x7 announced "Bringing User Sovereignty to Smartphones" by Dr. Shweta Shinde, ETH Zurich.
In this talk, Dr. Shinde presents a new smartphone architecture that maintains compatibility with the existing smartphone ecosystem but allows the balancing of the control over the phones. The proposed architecture, named TEEtime implements novel TEE-based mechanisms that allow the users to flexibly choose which resources (including peripherals) to dedicate to different isolated domains to securely execute applications. Read More
DFIR Stream 0x6 announced "Operationalizing Machine Learning for Networks" by Shinan Liu, University of Chicago.
In this talk, Shinan will talk about his recent endeavors (i.e., NetDiffusion and ServeFlow) on how to effectively solve these challenges and make ML practical for digital well-being tasks using network information. Read More
New Collaboration Between ACFTI and INSTICC: Advancing Cybersecurity Research
The Association of Cyber Forensics and Threat Investigators (ACFTI) and the Institute for Systems and Technologies of Information, Control, and Communication (INSTICC) in Portugal have announced a groundbreaking collaboration aimed at advancing research and education in the fields of cybersecurity, digital forensics, incident response, and threat investigations. Read More
CFATI 2024 Calls for Papers: IEEE CSR Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies, September 2-4, 2024.
The main motivation for this workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging technologies to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research, will be considered. The workshop welcomes submissions that evaluate existing research results by reproducing experiments. This workshop aims to provide insight for the discussion of the major research challenges and achievements on various topics of interest. Read More
AI Regulation and Cybercrimes: ACFTI’s Member Gabriella Marcelja's Speech at the United Nations in Geneva.
The Association of Cyber Forensics and Threat Investigators (ACFTI) is proud to announce that our member Gabriella Marcelja, CEO of SG Impact Ventures AG (Switzerland), and President of SIRIUS GLOBAL - Academic Diplomacy 4.0 (Rome, Italy) and the International Medical Community (IMC), delivered an address at the United Nations in Geneva earlier in March 2024. Read More
DFIR Stream 0x5 announced "A Holistic Approach to Cybersecurity Readiness: Application of the Commitment-Preparedness-Discipline Framework" by Dr. Dave Chatterjee, University of Georgia.
Dr. Chatterjee will draw upon his empirically derived Commitment-Preparedness-Discipline (CPD) framework to present a holistic approach to cybersecurity readiness. More specifically, he will speak to several success factors and best practices that will enable organizations to Read More
DFIR Stream 0x4 announced "Combating Targeted Ransomware Through Threat Hunting" by Amr Thabet, Founder of MalTrak.
This presentation will focus on understanding APT attacks & targeted ransomware attacks, why your security is failing you, and lastly, the step-by-step guide to implementing continuous threat hunting in your organizations to combat these attacks Read More
ACFTI Fellows Class of 2023 Announced
The Association of Cyber Forensics and Threat Investigators (ACFTI) has proudly unveiled the recipients of its highly esteemed Fellowship, acknowledging their outstanding accomplishments and services to the fields of digital forensics and threat investigations. Read More
DFIR Stream 0x3 announced "Security Enhancements for 5G Wireless Networks" by Professor Maode Ma, College of Engineering, Qatar University.
Recently, the Fifth Generation (5G) wireless network has become a major carrier for wireless communications that supports the Internet of Everything and large-scale heterogeneous connections. Nowadays, 5G wireless networks have been deployed in many countries in the world, such as Qatar Read More
DFIR Stream 0x2 announced "Securing the IoT: Harnessing Deep Learning for Robust and Interpretable Intrusion Detection" by Antonio Montieri and Domenico Ciuonzo.
In recent years, IoT traffic proliferation has been exponential and is poised for further escalation. With IoT devices being vulnerable targets for cyber-attacks, there is an urgent need for advanced and robust security tools in this vertical. Deep learning (DL) methods show promise for developing network intrusion detection systems (NIDSs) tailored to this challenge Read More
DFIR Stream 0x1 announced "Principles and Practice of Software Forensics" by Bob Zeidman, President of Zeidman Consulting.
Software copyright infringement and trade secret theft are problems of growing concern. Software code theft may be purposeful to gain an unfair advantage over a competitor, or it may be unintended as when a programmer takes code from one project and uses it in another project without first obtaining the appropriate rights Read More
CFTIC 2022 Calls for Papers: 2nd International Workshop on Cyber Forensics and Threat Investigations Challenges, October 10-11, 2022.
The main motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging infrastructures to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research, will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest. Read More
Call For Tutorials: ACFTI Training School October 2022.
The first edition of the ACFTI training school aims to provide both an objective and clear overview and an in-depth analysis of the state-of-the-art research as well as the professional best practices in cyber forensics and threat investigations and related fields. The tutorials will cover both theoretical and practical aspects of real cyber forensics and threat investigation problems. Read More
USW Cybersecurity Academics receive Google Award for Advancing Research on Cloud-based Technologies for Teaching IoT Security.
The search engine giant is investing in cutting-edge research to be conducted in the department of cybersecurity of the University of South Wales, with which it will be able to promote teaching and research initiatives in pursuit of Internet of Things security and virtualization in the cloud. Read More
Understanding the Real Threat of Ransomware.
The Information Security Media Group (ISMG) conducted a video interview with the cybersecurity specialist Prof. John Walker on hacking attacks and techniques. Read More
Best Paper Award Winners at ACFTI Workshop 2021.
Two papers were selected for this award. An evaluation committee considered the originality and significance of the papers as well as the presentations in determining the winners. These best paper awards are sponsored by our industrial partner "Belkasoft Inc.". Read More