The Call for Presentations for From the Source 2025 is open! Our Makers Track is aimed at developers of open source DFIR tools and the Hunters track covers the best Threat Intel research of the past year.
See the full details in our blog post: https://volatilityfoundation.org/announcing-ftscon-2025-in-person-malware-and-memory-forensics-training/
https://infosec.exchange/@volatility/114558453631998949
We are excited to announce FTSCon 2025 on October 20, 2025, in Arlington VA! Registration is now OPEN + we have a Call for Speakers.
Following FTSCon will be a 4-day, in-person Malware & Memory Forensics Training course with Volatility 3.
See the full details in our blog post here: https://volatilityfoundation.org/announcing-ftscon-2025-in-person-malware-and-memory-forensics-training/
We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post:
https://volatilityfoundation.org/announcing-the-official-parity-release-of-volatility-3/
Announcing the Official Parity Release of Volatility 3!
Visit the post for more.
The Volatility Foundation - Promoting Accessible Memory Analysis Tools Within the Memory Forensics CommunityThe 2024 @volatility #PluginContest review is complete! We received 6 submissions from 6 countries for 7 #Volatility3 plugins, a Linux profile generation tool & 9 supporting utilities!
We are excited to announce that the @volatility #PluginContest First Place winner is:
Valentin Obst for btf2json
Read the full Contest Results:
https://volatilityfoundation.org/the-2024-volatility-plugin-contest-results-are-in
Congrats to all winners & thank you to all participants!
#DFIR #memoryforensics

The 2024 Volatility Plugin Contest results are in!
Results from the 12th Annual Volatility Plugin Contest are in! We received 6 submissions, from 6 different countries, that included 7 plugins, a Linux profile generation tool, and 9 supporti…
The Volatility Foundation - Promoting Accessible Memory Analysis Tools Within the Memory Forensics CommunityAs seen in this guidance from NCSC published today, memory forensics continues to play a critical role in modern digital investigations! After almost 20 years, it's encouraging to still see the need for the amazing work by the @volatility contributors!
https://infosec.exchange/@volexity/113946437531563291
Volexity :verified: (@volexity@infosec.exchange)
It’s great to see NCSC drawing attention to the ongoing issues with network devices & appliances. https://www.ncsc.gov.uk/news/cyber-agencies-unveil-new-guidelines-to-secure-edge-devices-from-increasing-threat
Hopefully, vendors will heed the volatile data collection guidance: “Volatile data logging should support collection of… memory both at a kernel and individual process level.”
As reported in several of our recent blog posts, #memoryforensics of edge devices plays a critical role in helping to understand vulnerabilities and perform post-exploitation investigations: https://www.volexity.com/blog/tag/edge-device/
No ‘Ware To Hide!
#dfir
Infosec Exchange
Releases · volatilityfoundation/volatility3
Volatility 3.0 development. Contribute to volatilityfoundation/volatility3 development by creating an account on GitHub.
GitHub