What to Look For in a Write Blocker
One of the essential tools you’ll need when recovering video evidence from surveillance DVRs is a write blocker. Write blockers are devices that allow you to read the information on the drive without...
View ArticleWhat’s New in Magnet AXIOM Cyber 5.10
We’re happy to announce the availability of Magnet AXIOM Cyber 5.10! You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal. If you haven’t tried AXIOM Cyber yet,...
View ArticleMagnet AXIOM 5.10: Bringing Even More Support for iOS 15
We’re proud to announce the availability of Magnet AXIOM 5.10! You can upgrade to the latest version within AXIOM or over at the Customer Portal. With Magnet AXIOM 5.10, we’re offering expanded...
View ArticleSurveillance DVRs: Orderly Shutdown or Pulling the Plug?
One ongoing debate within the traditional computer forensics community has been how to respond to a running computer in the field. When you arrive on scene to a running computer, do you go straight to...
View ArticleMeet the Magnet Forensics’ Training Team: Nick Bria
Introducing our newest member of the Training Team, Nick Bria. Learn more about Nick’s varied and interesting background and what he’s hoping to bring to his role at Magnet Forensics. Let’s get to...
View ArticleDFIR in Zero-Trust Environments: Utilizing AXIOM Cyber for Remote Collection...
Organizations continue to embrace the zero-trust model to address security challenges brought about by distributed work environments. This means that every instance of communication must be validated...
View ArticleAnalysis of Hikvision Date/Time
Hikvision-based systems store date/time metadata a little differently than other DVR filesystems, and when it comes to adding support for new DVRs into DVR Examiner, or recovering video manually for a...
View ArticleData Recovery with DVR Examiner: Accessible, Inaccessible, and VERY Inaccessible
How does DVR Examiner work? Data recovery with DVR Examiner works by reverse engineering the many different DVR filesystems to locate and extract video footage. Most DVRs use a proprietary filesystem....
View ArticleMagnet Summit 2022 Capture the Flag Contests
Hi! This is Jessica Hyde and I am so excited to announce the plans for the Capture The Flag competitions at Magnet Summit 2022. As you may know, this year there are two components to the Magnet...
View ArticleFinding the Best Data Recovery Workflow in DVR Examiner 3
Data recovery is a key function of DVR Examiner for all our users, despite varying case load and case nature. An efficient workflow, and the ability for users to customize the workflow they follow...
View ArticleAdvanced Admin-Level Scan for macOS: Magnet OUTRIDER
Triaging Mac workstations has never been easier with Magnet OUTRIDER for Mac. From importing NCMEC data to using keywords and searching browser history, OUTRIDER can uncover actionable evidence...
View ArticleEnhanced Support for macOS Triage: Magnet OUTRIDER 3.1
We’re proud to announce the availability of Magnet OUTRIDER 3.1! With OUTRIDER 3.1, we are introducing even more triage support for macOS devices and external drives, including support for Chromium,...
View ArticleRecovering Deleted DVR Video with DVR Examiner
Recovering deleted DVR video is possible, despite the fact that many DVR users believe that by deleting video through the DVR interface they are rendering video unrecoverable. In most instances, when...
View ArticleWhat is a Filesystem?
A filesystem is a term that Magnet Forensics uses to refer to a specific family of DVRs. Families are often made up of several different lineages all combined, right? We see DVRs the same way. We deal...
View ArticleWrite Blocker vs. Imaging Device
Choosing between write blocker vs. imaging device isn’t easy. Imagine you’ve just been handed a hard drive from your boss who gives instructions to find all the vital information on it. You are...
View ArticleHow To Get Started with DVR Examiner
DVR Examiner allows you to recover video and metadata from CCTV and surveillance DVRs including those that are password protected or damaged. Let’s walk through the best practices to get started with...
View ArticleWhat is DVR Profiler?
If your DVR is not supported through DVR Examiner yet, you will be prompted to create a DVR Profiler report. These reports help us identify new DVRs that we haven’t encountered yet and are the first...
View Article3 Reasons to Automate Enterprise DFIR Workflows
The need to automate enterprise DFIR workflows is greater than ever. Private sector and enterprise organizations are facing an onslaught of cyberattacks that shows no sign of stopping. According to a...
View ArticleLeveraging Magnet Forensics Software for Human Trafficking Investigations
Author John Pizzuro is a 25-year veteran in law enforcement and has served in several roles, including investigating organized crime and being part of the New Jersey Internet Crimes Against Children...
View ArticleHow EDR Complements DFIR
Chances are if you have EDR (Endpoint Detection and Response) tools, your cybersecurity posture is mature enough that you also have DFIR (Digital Forensics and Incident Response) tooling as well. But...
View Article