Articles

Article

Case Study: From Hidden Databases to Key Evidence with Belkasoft's SQLite Viewer

In this case involving a pyramid scheme, key evidence was found in a hidden SMS database on the victim's iPhone. The investigator used Belkasoft X's SQLite viewer to uncover a critical text message exchange between the suspect and the victim, which was missed by other digital forensic tools.

Read more
Blog

Mobile Forensics Cheatsheet: iOS and Android System Artifacts

Download
Article

Document Forensics with Belkasoft X: Best Practices and Tips

Read more
Blog

Belkasoft Customer Survey 2024

Read more
Webinar

Go Deeper. Are your forensic tools showing you all the data in your investigations?

Get recording
Blog

BelkaDay Asia Conference 2024: Get Recordings

Read more
Blog

BelkaX-101: 3-Day Onsite Belkasoft Certified Examiner Course in Tbilisi

register
Blog

Register for a Free Digital Forensics Course: Windows Forensics with Belkasoft

Read more
Article

Case Study: From Hidden Databases to Key Evidence with Belkasoft X's SQLite Viewer

Read more
Webinar

Trusting AI in DFIR: Where It Shines and Fails

Register
Blog

BelkaX-101: 3-Day Onsite Belkasoft Certified Examiner Course

register
Blog

BelkaDay 2024: Digital Forensics and Cyber Incident Response Conference

Read more
Blog

Belkasoft Research: Inside the Battle against Child Sexual Abuse Material (CSAM)

Read more
Article

iOS Telegram Forensics. Part I: Acquisition and Database Analysis

Read more
Blog

How to Investigate Telegram Crime without Arresting the Company’s CEO

Read more
Blog

Belkasoft DFIR Workshops

Read more
Article

Android System Artifacts: Forensic Analysis of Application Usage

Read more
Article

Challenges in Digital Forensics: The Case of the Trump Rally Shooter's Phone

Read more
Webinar

Webinar: From the Field: Belkasoft X User's Guide to Effective Forensics

Get Recording
Blog

Case Study: Leveraging Belkasoft X for a Multi-Source Fraud Investigation

Read more
Blog

BelkaDay 2024: Digital Forensics and Cyber Incident Response Conference

Read more
Article

Android System Artifacts: Forensic Analysis of Device Information and Usage

Read more
Blog

Belkasoft CTF 6: Interview with the Winner

Read more
Article

Why choose Belkasoft X for digital forensics and cyber incident response?

Read more
Article

Android WhatsApp Forensics. Part II: Analysis

Read more
Article

Android WhatsApp Forensics. Part I: Acquisition

Read more
Blog

[ON-DEMAND COURSE] Android Forensics with Belkasoft

Read more
Article

How to Acquire Digital Evidence with Android Screen Capturer in Belkasoft X

Read more
Article

The Investigator’s Guide to Android Acquisition Methods. Part I: Device

Read more
Blog

Belkasoft 2023 Recap

Read more
Article

How to Efficiently Triage Digital Evidence with Belkasoft T

Read more
Article

Cyber Incident Response with Belkasoft X

Read more
Webinar

Webinar: Digital Triage with Belkasoft T

register
Article

Forensic Duel: Exploring Deleted WhatsApp Messages—iOS vs Android

Read more
Blog

Belkasoft Industry Research 2023

Read more
Article

Telegram Forensics: Getting Started

Read more
Article

DFIR Labs in the Cloud: The Future of Digital Forensics

Read more
Blog

Belkasoft Triage Is Now Free!

Read more
Article

Decoding Windows Registry Artifacts with Belkasoft X: UserAssist

Read more
Article

iCloud Advanced Data Protection: Implications for Forensic Extraction

Read more
Article

iOS System Artifacts: Revealing Hidden Clues

Read more
Blog

Download your free e-book "Essays on Digital Forensics"

Read more
Article

iOS WhatsApp Forensics with Belkasoft X

Read more
Article

How to create hashset databases with Belkasoft X

Read more
Blog

Belkasoft Industry Survey 2023

Read more
Blog

[ON-DEMAND COURSE] iOS Forensics with Belkasoft

Read more
Article

Unlocking iOS Devices with Brute-Force

Read more
Blog

How to Analyze KnowledgeC.db with Belkasoft X

Read more
Article

Ins and Outs of Hashing and Hashset Analysis in Belkasoft X

Read more
Article

Case Study: Belkasoft X Helps to Define CSAM Recidivism Immediately

Read more
Article

DIY YARA vs. YARA with Belkasoft X

Read more
Article

KnowledgeC Database Forensics: A Comprehensive Guide

Read more

What's new in Belkasoft X v.2.0

Read more
Blog

[ON-DEMAND COURSE] Maximizing DFIR Results with YARA, Sigma, and Belkasoft X

Read more
Article

Automation with Belkasoft: Orchestrating Belkasoft X and Griffeye DI Pro

Read more
Article

Incident Response with Belkasoft: First steps

Read more
Webinar

Belkasoft X Brute-Force Webinar

register
Article

Case of Casey Anthony: Extraneous Digital Evidence

Read more
Blog

Belkasoft Mobile Device Investigations Course

Read more
Article

Walkthrough: YARA Rules in Belkasoft X

Read more
Article

Lagging for the Win: Querying for Negative Evidence in the sms.db

Read more
Webinar

SQLite Forensics with Belkasoft

register
Article

Basic but significant legal issues in the Casey Anthony Case

Read more
Blog

Download your free e-book on ChatGPT in DFIR!

Read more
Article

Walkthrough: Sigma Rules in Belkasoft X

Read more
Article

Automation with Belkasoft X: Putting the pieces together

Read more
Article

Automation with Belkasoft X: Installation and Licensing

Read more
Article

Automation with Belkasoft: Export for Amped FIVE

Read more
Article

Digital Forensic Work Automation with Belkasoft X

Read more
Blog

NIST tested Belkasoft support for SQLite data recovery

Read more
Blog

Belkasoft’s Year in Review—2022

Read more
Blog

[ON-DEMAND COURSE] SQLite Forensics with Belkasoft

Read more
Webinar

Webinar: MacOS forensics. Decryption and analysis of apps images from Macs with T2

Watch
Blog

Belkasoft Customer Survey 2022

Read more
Blog

[ON-DEMAND COURSE] Remote Acquisition with Belkasoft

Read more
Blog

The riskiest cybersecurity danger for your business this fall

Read more
Blog

Sneak peek of Belkasoft X v.1.15

Read more
Blog

Internal or external: what data breach elicits the greater risk and damage?

Read more
Blog

EVEN 5 MORE Bloopers of a Digital Forensic Investigator (Part 3)

Read more
Blog

[ON-DEMAND COURSE] Corporate Investigations with Belkasoft

Read more
Blog

5 MORE Bloopers of a Digital Forensic Investigator (Part 2).

Read more
Article Blog

SQLite Forensics with Belkasoft X

Read more
Blog

Sneak peek of Belkasoft X v.1.14

Read more
Blog

Cyber Incident Investigations Course with Belkasoft

Read more
Blog

The importance of fully charged devices in your digital forensic investigation

Read more
Blog

Career Path—The Choice is Yours

Read more
Article Blog

Where in the world were John McAfee and An0nymous? A tell-tale sign from EXIF data

Read more
Blog

Sneak peek of Belkasoft X v.1.13

Read more
Article Blog

Encryption amidst digital forensic and cyber incident response investigations

Read more
Blog

Belkasoft Triage T v.1.2 is released!

Read more
Blog

Preventing burnout in digital forensics

Read more
Blog

Stay in good physical shape: look past the screen of a digital forensic examiner

Read more
Blog

These chats are not mine! How our test engineer almost went crazy

Read more
Blog

How memory analysis helped to fight against "designer drugs"

Read more
Blog

What's new in Belkasoft X v.1.12

Read more
Blog

How even an experienced DFIR expert can catch a virus?

Read more
Blog

The case of a missing girl and the power of a memory dump

Read more
Blog

Belkasoft CTF March 2022: Write-Up

Read more
Blog

[ON-DEMAND COURSE] Mobile Forensics with Belkasoft X

Read more
Blog

Sneak peek: Belkasoft announces the upcoming release of Belkasoft X v.1.12

Read more
Blog

[INFOGRAPHICS] Mobile forensics with Belkasoft

Read more
Article Blog

Why RAM dumping is so important and what tool to use?

Read more
Blog

How even the best evidence can fail in court

Read more
Blog

Browser forensics and the case of Casey Anthony

Read more
Blog

Magic wand or scientific approach? Myths and realities about digital forensic software

Read more
Blog

5 Bloopers of a Digital Forensic Investigator

Read more
Article Blog

Preserving chain of custody in digital forensics

Read more
Article Blog

Where did this chat come from? The 'Origin path' concept in Belkasoft X

Read more
Blog

Сhristmas edition: Inspirational stories about digital forensics folks

Read more
Blog

Support Belkasoft at the SANS Difference Makers Awards!

Read more
Blog

iCloud acquisition and analysis with Belkasoft X

Read more
Blog

Why a term-based license is NOT good for Digital Forensics market

Read more
Article

Mobile Forensics Software: Why Belkasoft X Should Be Your Tool of Choice

Read more
Article

Media file forensics with Belkasoft X

Read more
Article

Android Viber Forensics with Belkasoft X

Read more
Blog

Triaging Windows-based computers with Belkasoft T

Read more
Blog

Belkasoft Releases Belkasoft T v.1.1

Read more
Blog

Belkasoft Appoints Arvinder Garcha as VP to Lead Company's Channel Development

Read more
Blog

Digital Forensics Survey 2021: Results

Read more
Article

iOS Signal decryption with Belkasoft X

Read more
Blog

Belkasoft is introducing a show 'BelkaTalk on DFIR'

Read more
Article

Android Screen Capturing with Belkasoft X

Read more
Blog

How to Acquire Data from an Android Device Using the APK Downgrade Method

Read more
Blog

Belkasoft T — a new effective DFIR triage tool

Read more
Blog

Belkasoft DFIR Survey 2021: Your Personal Advisor

Read more
Article

SANS Institute: Six Steps to Successful Mobile Validation

Read more
Article

Investigating the Dropbox Desktop App for Windows with Belkasoft X

Read more
Article

Analyzing videos with multiple video streams in digital forensics

Read more
Article

How to analyze different types of devices and find connections between them

Read more
Article

Find out what happened during a ransomware attack on computer

Read more
Article

eDiscovery with Belkasoft

Read more
Article

Dealing with Apple's USB Restricted Mode

Read more
Article

Unc0ver: What you should know about this new jailbreak for iOS devices

Read more
Article

WhatsApp Forensics on Computers (Windows PCs and Macs)

Read more
Blog

Checkm8 Review

Read more
Article

Decrypting iOS Signal App Data with Belkasoft Evidence Center

Read more
Article

Mitigating security risks using Belkasoft Evidence Center

Read more
Article

Keychain Extraction in Belkasoft Evidence Center

Read more

Checkm8 Glossary

Read more
Article

Full File System Extraction of iOS Devices with Belkasoft X

Read more
Article

Analyzing HiSuite Backups with Belkasoft Evidence Center

Read more
Article

Results of Customer Survey 2019: Findings and Insights

Read more
Article

Analyzing Jump Lists with Belkasoft Evidence Center

Read more
Article

Forensic Extraction of Data from Mobile Apple Devices with Belkasoft Products

Read more
Article

Forensic Analysis of LNK Files

Read more
Article

Does your DFIR tool have substantial updates?

Read more
Article

Building a Timeline: A Case for Belkasoft Evidence Center

Read more
Article

I took Belkasoft Evidence Center for a spin around the block

Read more
Article

Belkasoft Evidence Center: A View from Spain

Read more
Article

How to Use Connection Graphs by Belkasoft for Complex Cases

Read more
Article

Walkthrough: How to Perform Remote Acquisition of Digital Devices

Read more
Article

How to Analyze Windows 10 Timeline with Belkasoft Evidence Center X

Read more
Article

How To Use Cross-Case Search With Belkasoft Evidence Center

Read more
Article

Reasons Why You Need Belkasoft Evidence Center to Fight Workplace Bullying. Part II

Read more
Article

5 Reasons Why Corporate Investigators Need Belkasoft to Fight Workplace Bullying. Part 1

Read more
Article

Fast Detection of Mobile Malware and Spyware with Belkasoft

Read more
Article

Carving and its Implementations in Digital Forensics

Read more
Article

WeChat. The Forensic Aspects Of and Uses For Evidence from a Super-App

Read more
Article

Comprehensive Forensic Chat Examination with Belkasoft

Read more
Article

I Have Been Hacked

Read more
Article

SSD and eMMC Forensics 2016—Part 3

Read more
Article

SSD and eMMC Forensics 2016—Part 2

Read more
Article

SSD and eMMC Forensics 2016—Part 1

Read more
Article

BelkaScript: How to Get Most out of Digital Forensic Software

Read more
Article

The Future of Mobile Forensics: November 2015 Follow-up

Read more
Article

Countering Anti-Forensic Efforts - Part 2

Read more
Article

Countering Anti-Forensic Efforts—Part 1

Read more
Article

NAS Forensics Explained

Read more
Article

Future of Mobile Forensics

Read more
Article

Acquiring Windows PCs

Read more
Article

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Read more
Article

Kik Messenger Forensics

Read more
Article

Analyzing Windows Phone 8.1 JTAG and UFED Dumps

Read more
Article

Forensic Analysis of SQLite Databases

Read more
Article

SSD Forensics 2014. Recovering Evidence from SSD Drives

Read more
Article

Recovering Destroyed SQLite Evidence, iPhone/Android Messages, Cleared Skype Logs

Read more
Article

Detecting Altered Images

Read more
Article

Catching the ghost: how to discover ephemeral evidence with Live RAM analysis

Read more
Article

Why SSD Drives Destroy Court Evidence, and What Can Be Done About It

Read more
Article

Retrieving Digital Evidence: Methods, Techniques and Issues

Read more