October Newsletter


Using browser history to detect a potential malware infection
Are you using browser history to quickly identify points of compromise in your environment? Browser History Examiner now integrates with the URLhaus Database to highlight any webpages visited which are known to be serving malware to visitors. Read more about this new feature in the following article:
https://www.foxtonforensics.com/blog/post/using-browser-history-to-detect-a-potential-malware-infection

Recovering Skype artifacts using Browser History Examiner
Our latest article discusses how desktop apps built using the Electron framework create some of the same artifacts as Google Chrome. In particular we discuss how it's possible to use Browser History Examiner to recover data from the Skype desktop app, such as images shared during conversations and phone numbers from missed calls.
https://www.foxtonforensics.com/blog/post/following-the-trail-of-skype-electron-and-chromium

Browser History Examiner v1.13.0 released
BHE v1.13.0 has been released adding improvements to URL category filtering. Customers with a support subscription can download this update from our customer portal:
https://www.foxtonforensics.com/downloads/products/