Magnet AXIOM 6.5: Enhancing Your Analytical Tools
Magnet AXIOM 6.5 is now available with new enhancements for Timeline and Media Explorer so you can uncover and manage your case evidence with ease. In addition to the Timeline performance enhancements...
View ArticleWorking With Dell Data Protection Encryption (DDPE) in AXIOM Cyber
DDPE is a file-based encryption method commonly used by businesses to help protect their IP and corporate knowledge. But sometimes the tools that have been put in place to protect our data can...
View ArticleWhat is MRU (Most Recently Used)?
MRU artifacts, or Most Recently Used are a variety of artifacts tracked by modern Windows operating systems that provide crucial details regarding the user’s interaction with files, folders, and...
View ArticleMagnet Virtual Summit: Get Your Presentation Submissions in for the 2023 Call...
We’re excited to be bringing back Magnet Virtual Summit to DFIR experts and newcomers alike from February 21-March 2, 2023! Part of what makes MVS such a fantastic virtual event is that a wide...
View ArticleiOS 16: What Digital Investigators Need to Know
With Apple’s announcement of iOS 16’s official launch date, as well as providing their latest “gold master” build, we wanted to take a dive into iOS 16 and see what all was going to be new from an...
View ArticleWhat’s New in the Comae Beta: Playbooks & APIs
As part of the Comae beta program (currently open in Magnet Idea Lab), we are regularly introducing new features for the community of testers to provide feedback on. These new features, in addition to...
View ArticleLoading Cellebrite Images into Magnet AXIOM
Cellebrite images are quite popular, as the tool supports many different devices and extraction types. Because of this, you may get several different image types depending on the device and the type...
View ArticleReviewing Email Evidence with Email Explorer in Magnet AXIOM Cyber
“This meeting could have been an email” has become a running joke (and sometimes a legitimate complaint) in many offices, but also highlights the continued importance of email communication for...
View ArticleCollecting Remote Volatile Artifacts and What They Can Tell You
Earlier this year, we introduced a new artifact category, volatile artifacts, which allows you to remotely collect live system information. Volatile artifacts are an especially important element of...
View ArticleMagnet AXIOM Cyber 6.6: New Volatile Artifacts for Incident Response...
Magnet AXIOM Cyber 6.6 is here, and in this release, we have added new and updated features to help you collect, review, and interpret the evidence you need to keep your investigations moving forward....
View ArticleMagnet AXIOM 6.6: Parse Keychains From CLBX Extractions in Magnet AXIOM
Magnet AXIOM 6.6 is now available, and in this release, we’re introducing parsing for CLBX keychain, so you can uncover more from Cellebrite UFED and Premium iOS extractions. Plus, we are continuing...
View ArticleSubmissions Are Open for the 2022 Magnet Forensics Scholarship Program
We’re proud to once again be able to offer promising officers an opportunity to enter the field of, and advance in, digital forensics through the Magnet Forensics Scholarship Program. Applications are...
View ArticleMagnet Forensics is an eDiscovery Major Player in the IDC MarketScape
We’re excited to share that Magnet Forensics has been named a Major Player in eDiscovery Early Case Assessment Software by the IDC MarketScape. The IDC MarketScape: Worldwide eDiscovery Early Case...
View ArticleCollecting Box.com Activity in Magnet AXIOM Cyber
With the continued trend towards remote work and dispersed workforces, companies are increasingly turning to cloud services for file storage, management and collaboration. Providing the storage for...
View ArticleHave Your Say on The State of Enterprise DFIR
The State of Enterprise DFIR survey is now open. We invite you to anonymously share your thoughts on the latest DFIR industry trends and developments, emerging threats, operational challenges, and...
View ArticleMagnet DVR Examiner 3.2: Improving Your Workflow With New Features
Magnet DVR Examiner 3.2 is now available, and in this release, we’re introducing some key features to help you streamline your workflow and identify the evidence you need as quickly as possible....
View ArticleSRUM: Forensic Analysis of Windows System Resource Utilization Monitor
SRUM, or System Resource Utilization Monitor, is a feature of modern Windows systems (Win8+), intended to track the application usage, network utilization and system energy state. SRUM, as with most...
View ArticleIdentify Malicious Files and IOCs With YARA Rules in Magnet IGNITE
To help keep your organization and clients up to date with the very latest malware threats, we have added the ability to perform live scans of endpoints using YARA rules in Magnet IGNITE. New and...
View ArticleWe’re Coming Back to Nashville for Magnet User Summit 2023!
We’re excited to announce that we’re coming back to Music City for Magnet User Summit 2023! Join us at the Embassy Suites by Hilton Nashville Downtown on April 17-19, 2023, for a special three-day...
View ArticlePre-processing and Acquiring User Data in Microsoft 365
Pre-processing and acquiring user data in Microsoft 365 is important. With a market share of close to 48%, Microsoft 365 (formerly Office 365) is used by about one million companies worldwide,...
View Article