
Sign up to save your podcasts
Or


In this episode of F for Forensics, we dig beneath the operating system into the hidden world of firmware forensics. Discover how BIOS, UEFI, IoT devices, and embedded controllers store traces of tampering and compromise. From analyzing firmware dumps to detecting persistent malware, this episode explores what happens when the investigation goes beyond the hard drive.
#FforForensics, #FirmwareForensics, #DigitalForensics, #DFIR, #CyberForensics, #UEFI, #BIOS, #EmbeddedSystems, #IoTForensics, #MalwareAnalysis, #IncidentResponse, #ForensicPodcast, #CyberSecurity, #ComputerForensics
By Ben & AlexIn this episode of F for Forensics, we dig beneath the operating system into the hidden world of firmware forensics. Discover how BIOS, UEFI, IoT devices, and embedded controllers store traces of tampering and compromise. From analyzing firmware dumps to detecting persistent malware, this episode explores what happens when the investigation goes beyond the hard drive.
#FforForensics, #FirmwareForensics, #DigitalForensics, #DFIR, #CyberForensics, #UEFI, #BIOS, #EmbeddedSystems, #IoTForensics, #MalwareAnalysis, #IncidentResponse, #ForensicPodcast, #CyberSecurity, #ComputerForensics