Collecting Google Drive Activity in Magnet AXIOM Cyber
With AXIOM Cyber you can now get even more Google Drive Activity data from Google Workspace thanks to the ability to collect a record of user activity on a Google Drive account. One of the most...
View ArticleWhat’s New in Magnet AXIOM Cyber 6.1
Fresh on the heels of the recent major release of AXIOM Cyber 6.0, we are thrilled to announce the availability of AXIOM Cyber 6.1! AXIOM Cyber 6.1 builds on artifacts and features introduced in AXIOM...
View ArticleMagnet Forensics Acquires Cybersecurity Software Firm Comae Technologies
We’re excited to announce that Magnet Forensics has acquired the strategic IP assets of Comae Technologies, a UAE-based cybersecurity company that specializes in cloud-based memory analysis used to...
View ArticleMeet the Magnet Forensics’ Training Team: Thad Winkelman
Introducing our newest member of the Training Team, Thad Winkelman. Learn more about Thad’s varied and interesting background and what he’s hoping to bring to his role at Magnet Forensics. Let’s get...
View ArticleMeet the Magnet Forensics’ Training Team: Anthony DaSilva
Introducing our newest member of the Training Team, Anthony DaSilva. Learn more about Anthony’s varied and interesting background and what he’s hoping to bring to his role at Magnet Forensics. Let’s...
View ArticleThree New Magnet Training Certifications Available to Demonstrate Your Expertise
One of the many exciting things we unveiled at Magnet Summit 2022 was the introduction of three brand new free certification programs—giving you an opportunity to showcase your expert-level competence...
View ArticleUpdate on Magnet Summit 2022 Capture the Flag Contests
Hi! This is Jessica Hyde and I am so excited to revisit the Magnet Summit 2022 Capture the Flag contests. We had so much fun with both the in-person and virtual Capture the Flag events in April and we...
View ArticleNew Guide: Modernizing Digital Forensics Workflows with Magnet AUTOMATE...
Modernizing digital forensics workflows is now essential, since the threat landscape for enterprise Digital Forensics and Incident Response (DFIR) professionals has never been more challenging:...
View ArticleThe Expanding Case for Early Case Assessment With Rapid Triage Tools
How can we possibly keep up against cybersecurity threats? The instances of cybersecurity threats targeting businesses continue to grow at an alarming rate—with cyberattack attempts on corporate...
View ArticleMagnet AXIOM 6.2: Surface Handwritten Documents Automatically
Magnet AXIOM 6.2 is now available, which adds a new handwriting classifier in Magnet.AI and improved viewing experiences for key iOS apps, in addition to several new UX enhancements to help you work...
View ArticleAXIOM Cyber 6.2: Email Explorer, VirusTotal Integration and Volatile Artifacts.
Only two months after the release Magnet AXIOM Cyber 6.0, we’ve delivered several new and exciting features in Magnet AXIOM Cyber 6.2, including: Email Explorer VirusTotal Integration Volatile...
View ArticleAccessing VirusTotal Insights Through Magnet AXIOM Cyber
As part of the continuous development of Magnet AXIOM Cyber’s incident response capabilities, we’ve integrated VirusTotal giving you the ability to quickly check files against their database of known...
View ArticleReviewing Email Evidence with Email Explorer in Magnet AXIOM Cyber
“This meeting could have been an email” has become a running joke (and sometimes a legitimate complaint) in many offices, but also highlights the continued importance of email communication for...
View ArticleHow to get started with Comae
We’re excited to introduce Comae to Magnet Idea Lab—giving you a chance to beta test the solution and give us valuable feedback! Comae allows IR professionals to diagnose cyber-attacks quickly and...
View ArticleAutomating Insider Threat Investigations with SIEM Integration in Magnet...
Insider threats, whether due to malicious action, inadvertent breaches, or negligence, put your company at risk of potentially significant financial and reputational consequences. Costs can add up in...
View ArticleHow to Conquer Memory Analysis for Incident Response, Threat Hunting and...
This is a post authored by Matt Suiche (Director, Memory, IR & R&D • Product Management, Magnet Forensics & Founder, Comae Technologies & OPCDE Conference) with contributions by Jamey...
View ArticleAnnouncing the Winners of the 2022 Magnet Forensics CTF
The June 2022 Magnet Forensics CTF was another exciting competition, and we’re happy to announce the winners! Andreas Klaus (NOP_)evandrixMarkus Dauberschmidt (daubsi) We want to give you the...
View ArticleMagnet REVIEW 4.0: Helping You Bring Investigators and Their Evidence Together
We’re very excited to share some of the great new features in Magnet REVIEW 4.0—helping digital forensic examiners bring their investigators and the evidence they need together by enabling secure...
View ArticleDigital Evidence Processing: Parsing-Only Processing and Post-Process Carving
Processing evidence sources that contain terabytes of data and hundreds of thousands of artifacts is now a common and sometimes time-consuming process. Magnet AXIOM and Magnet AXIOM Cyber offer you...
View ArticleiOS “Find My” Artifacts Support in Magnet AXIOM and AXIOM Cyber
When the Find My app (creating Find My artifacts) was originally released by Apple in 2019, it was limited to locating user devices, but the app has since expanded to find more than just users’...
View Article