Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Magnet AXIOM 6.5: Enhancing Your Analytical Tools

Magnet AXIOM 6.5 is now available with new enhancements for Timeline and Media Explorer so you can uncover and manage your case evidence with ease. In addition to the Timeline performance enhancements...

View Article


Image may be NSFW.
Clik here to view.

Working With Dell Data Protection Encryption (DDPE) in AXIOM Cyber 

DDPE is a file-based encryption method commonly used by businesses to help protect their IP and corporate knowledge. But sometimes the tools that have been put in place to protect our data can...

View Article


Image may be NSFW.
Clik here to view.

What is MRU (Most Recently Used)?

MRU artifacts, or Most Recently Used are a variety of artifacts tracked by modern Windows operating systems that provide crucial details regarding the user’s interaction with files, folders, and...

View Article

Magnet Virtual Summit: Get Your Presentation Submissions in for the 2023 Call...

We’re excited to be bringing back Magnet Virtual Summit to DFIR experts and newcomers alike from February 21-March 2, 2023! Part of what makes MVS such a fantastic virtual event is that a wide...

View Article

Image may be NSFW.
Clik here to view.

iOS 16: What Digital Investigators Need to Know

With Apple’s announcement of iOS 16’s official launch date, as well as providing their latest “gold master” build, we wanted to take a dive into iOS 16 and see what all was going to be new from an...

View Article


What’s New in the Comae Beta: Playbooks & APIs

As part of the Comae beta program (currently open in Magnet Idea Lab), we are regularly introducing new features for the community of testers to provide feedback on. These new features, in addition to...

View Article

Image may be NSFW.
Clik here to view.

Loading Cellebrite Images into Magnet AXIOM

Cellebrite images are quite popular, as the tool supports many different devices and extraction types. Because of this, you may get several different image types depending on the device and the type...

View Article

Reviewing Email Evidence with Email Explorer in Magnet AXIOM Cyber

“This meeting could have been an email” has become a running joke (and sometimes a legitimate complaint) in many offices, but also highlights the continued importance of email communication for...

View Article


Collecting Remote Volatile Artifacts and What They Can Tell You

Earlier this year, we introduced a new artifact category, volatile artifacts, which allows you to remotely collect live system information. Volatile artifacts are an especially important element of...

View Article


Magnet AXIOM Cyber 6.6: New Volatile Artifacts for Incident Response...

Magnet AXIOM Cyber 6.6 is here, and in this release, we have added new and updated features to help you collect, review, and interpret the evidence you need to keep your investigations moving forward....

View Article

Image may be NSFW.
Clik here to view.

Magnet AXIOM 6.6: Parse Keychains From CLBX Extractions in Magnet AXIOM

Magnet AXIOM 6.6 is now available, and in this release, we’re introducing parsing for CLBX keychain, so you can uncover more from Cellebrite UFED and Premium iOS extractions. Plus, we are continuing...

View Article

Submissions Are Open for the 2022 Magnet Forensics Scholarship Program

We’re proud to once again be able to offer promising officers an opportunity to enter the field of, and advance in, digital forensics through the Magnet Forensics Scholarship Program. Applications are...

View Article

Magnet Forensics is an eDiscovery Major Player in the IDC MarketScape

We’re excited to share that Magnet Forensics has been named a Major Player in eDiscovery Early Case Assessment Software by the IDC MarketScape. The IDC MarketScape: Worldwide eDiscovery Early Case...

View Article


Collecting Box.com Activity in Magnet AXIOM Cyber

With the continued trend towards remote work and dispersed workforces, companies are increasingly turning to cloud services for file storage, management and collaboration. Providing the storage for...

View Article

Have Your Say on The State of Enterprise DFIR

The State of Enterprise DFIR survey is now open. We invite you to anonymously share your thoughts on the latest DFIR industry trends and developments, emerging threats, operational challenges, and...

View Article


Image may be NSFW.
Clik here to view.

Magnet DVR Examiner 3.2: Improving Your Workflow With New Features

Magnet DVR Examiner 3.2 is now available, and in this release, we’re introducing some key features to help you streamline your workflow and identify the evidence you need as quickly as possible....

View Article

Image may be NSFW.
Clik here to view.

SRUM: Forensic Analysis of Windows System Resource Utilization Monitor

SRUM, or System Resource Utilization Monitor, is a feature of modern Windows systems (Win8+), intended to track the application usage, network utilization and system energy state. SRUM, as with most...

View Article


Image may be NSFW.
Clik here to view.

Identify Malicious Files and IOCs With YARA Rules in Magnet IGNITE

To help keep your organization and clients up to date with the very latest malware threats, we have added the ability to perform live scans of endpoints using YARA rules in Magnet IGNITE. New and...

View Article

We’re Coming Back to Nashville for Magnet User Summit 2023!

We’re excited to announce that we’re coming back to Music City for Magnet User Summit 2023! Join us at the Embassy Suites by Hilton Nashville Downtown on April 17-19, 2023, for a special three-day...

View Article

Pre-processing and Acquiring User Data in Microsoft 365

Pre-processing and acquiring user data in Microsoft 365 is important. With a market share of close to 48%, Microsoft 365 (formerly Office 365) is used by about one million companies worldwide,...

View Article
Browsing all 1190 articles
Browse latest View live