Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Infostealer Malware: What is it and how to investigate 

What are Infostealer Malware?  Infostealers are a type of malware specifically designed to locate and exfiltrate credentials. Their prevalence and impact were limited pre-COVID-19 as most of the...

View Article


Image may be NSFW.
Clik here to view.

All the Action from Magnet User Summit 2023 

We couldn’t wait to head back to Music City (Nashville, Tennessee) to catch up with friends old and new and talk about all things Magnet Forensics and DFIR for Magnet User Summit 2023!  We had a...

View Article


Image may be NSFW.
Clik here to view.

Hunting Russian Intelligence “Snake” Malware in Memory With Magnet AXIOM Cyber

This memory analysis post is authored by Matt Suiche (Director, Memory, IR & R&D). This week, a joint cybersecurity advisory was issued by the cybersecurity authorities (AA22-110A) of the...

View Article

Image may be NSFW.
Clik here to view.

CSAM: Arming Investigators With Tools and Tips to Combat Child Sexual Abuse...

Since Magnet Forensics’ inception, we’ve been dedicated to our mission statement: Seek Justice and Protect the Innocent. Combatting Child Sexual Abuse Material (CSAM) is a big part of that. The ethos...

View Article

Image may be NSFW.
Clik here to view.

Automating Cloud Acquisitions With Magnet AUTOMATE Enterprise

We’re excited to announce that automated cloud acquisitions are available in Magnet AUTOMATE Enterprise automated workflows! AUTOMATE Enterprise always supported the processing of cloud images that...

View Article


Image may be NSFW.
Clik here to view.

Magnet AXIOM Cyber 7.1 Is Now Available

We are happy to announce the release of Magnet AXIOM Cyber 7.1. In this release, we have added new features and improvements to help you work as efficiently as possible, including: Ability to Search...

View Article

Image may be NSFW.
Clik here to view.

Magnet AXIOM 7.1 is Now Available!

A critical component of digital forensic examinations is the need to collaborate and discuss the findings from the case data with other stakeholders. This can include attorneys, other investigators,...

View Article

Image may be NSFW.
Clik here to view.

Infostealer Malware: What is it and how to investigate 

What are Infostealer Malware?  Infostealers are a type of malware specifically designed to locate and exfiltrate credentials. Their prevalence and impact were limited pre-COVID-19 as most of the...

View Article


Image may be NSFW.
Clik here to view.

Best Practices for Ransomware and Data Extortion Memory Response

This is a post authored by Matt Suiche (Director, Memory, IR & R&D), and Ivan King (Security Research Engineer). The Cybersecurity and Infrastructure Security Agency (CISA) & partners...

View Article


Hunting “Volt Typhoon” State-Sponsored Actor in Memory With Magnet AXIOM Cyber

This is a post authored by Matt Suiche (Director, Memory, IR & R&D). The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory...

View Article

Image may be NSFW.
Clik here to view.

A Guide to Peak Hardware Performance for Magnet AXIOM

This post is authored by Christopher Cone, a Forensic Consultant at Magnet with 20 years of law enforcement experience. Recently, I have seen user questions about hardware choices as it relates to...

View Article

Magnet AXIOM Cyber 7.2 Is Now Available

We are happy to announce the release of Magnet AXIOM Cyber 7.2. In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated...

View Article

Image may be NSFW.
Clik here to view.

Magnet AXIOM 7.2 Now Available

We are thrilled to announce the release of Magnet AXIOM 7.2! This latest release introduces new features to help make it easier to access, view, and verify critical information from mobile sources for...

View Article


Image may be NSFW.
Clik here to view.

How To Get the Most Out of Your GrayKey Extractions

GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to...

View Article

CL0P: Hunting a New Kind of Ransomware

This is a post authored by Matt Suiche (Director, Memory, IR & R&D). The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory...

View Article


Image may be NSFW.
Clik here to view.

How to Investigate Infostealer Malware 

If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared. In this article,...

View Article

Image may be NSFW.
Clik here to view.

A Guide to Peak Software Performance for Magnet AXIOM

In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment—following up on part...

View Article


Image may be NSFW.
Clik here to view.

TrueBot Malware: What It Is and How to Hunt It

This is a post authored by Matt Suiche (Director, Memory, IR & R&D). The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a cybersecurity advisory...

View Article

Image may be NSFW.
Clik here to view.

How to Connect Magnet AXIOM Cyber Directly to VeraKey for Mobile Device...

Organizations leveraging VeraKey for their consent-based mobile device extractions are provided access to full file system acquisitions of both iOS and Android devices. These full file system images...

View Article

Image may be NSFW.
Clik here to view.

Introducing Magnet AXIOM 7.3: Video Preview, Lockscreen Data and More

We’re excited to announce the release of Magnet AXIOM 7.3! This latest version introduces a number of new features to help make your digital evidence analysis and reporting faster and easier, along...

View Article
Browsing all 1190 articles
Browse latest View live