Magnet AXIOM 7.5 – Continuing to Improve Mobile Investigations With Magnet...
We’re excited to announce the release of Magnet AXIOM 7.5! This latest version of AXIOM adds several new features to help make your digital evidence analysis and reporting faster and easier. AXIOM’s...
View ArticleDeep Dive on Portable Case Part 1
One of the most essential parts of the forensic process is reporting what you find on a system. Often, the forensic examiner may only know part of the case. Not having the complete picture as a single...
View ArticleiOS 17 Forensics: Another Year, Another Byte of the Apple
With another year gone by, it’s time for another version of iOS to hit the market to coincide with the release of the iPhone 15 series and Apple’s first inclusion of the USB-C port to its iPhone line....
View ArticleDeep Dive on Portable Case Part 2
In part one of our Portable Case series, we looked at the features and benefits of Portable Case. We highlighted the power of real-time collaboration with multiple stakeholders and having all the...
View ArticleUpdated Memory Analysis Capabilities in Magnet IGNITE
As preventative tools have gotten more adept at blocking traditional cyberattacks, bad actors have increasingly leveraged tactics that run only in memory, making them near invisible to most detection...
View ArticleThe Art of Detection: Digital Forensics and Intellectual Property Theft
What Is Intellectual Property (IP)? Company-owned data, copyrighted work, trademarks, and patents are all forms of intellectual property. Intellectual property rights are designed to protect...
View ArticleSmall Bytes: Digital Forensics Exonerates Husband From Murder Charges
As technology evolves, law enforcement agencies must be equipped with the tools and expertise to use digital forensics in their investigations effectively. In cases where traditional forensic evidence...
View ArticleHow to Detect BLASTPASS Inside a WebP File
This is a post authored by Matt Suiche (Director of Detection Engineering). Introduction Once again, compression algorithms are showing us that they are ruling the internet. My initial encounter with...
View ArticleMagnet AXIOM Cyber 7.6: New Remote Endpoint File Listing For Quick Insights
The latest version of Magnet AXIOM Cyber is now available! In this release, we focused on new features and improvements to make your investigations even faster and easier, no matter what type of case...
View ArticleThree Ways to Use Remote Endpoint File Lists to Streamline Your Investigations
When you’re faced with a security incident or supporting an internal investigation, quickly obtaining Remote Endpoint File Lists (a full list of all the files and folders present on an endpoint or...
View ArticleMagnet AXIOM 7.6: 3D Printed Weapon Classifier, Protobuf Enhancements, and More
We’re thrilled to announce the release of Magnet AXIOM 7.6! In this release, we have added several new and updated features to streamline your workflows and help make your digital evidence analysis...
View ArticleResponding at Scale with Magnet RESPONSE
This is a post authored by Doug Metz, Security Forensics Consultant. What is Magnet RESPONSE? Magnet RESPONSE is a free tool that lets investigators and non-technical users easily collect and preserve...
View ArticleHow to Uncover Geolocation Artifacts for Mobile Device Investigations
Geolocation artifacts are forensically valuable data created by GPS or other location-based technologies on a device that determine an individual’s geographic location. This data can be useful in...
View ArticleAnnouncing Magnet GRAYKEY Fastrak – Scale Up Your Mobile Data Collection
Mobile smartphones have become engrained in our daily lives, so when someone commits a crime, mobile data is almost always a critical source of evidence. Magnet GRAYKEY provides the ability to quickly...
View ArticleHow to Uncover Communication Artifacts for Mobile Device Investigations
Communication artifacts are digital breadcrumbs suspects leave behind in the form of emails, social media, native chat applications like the Messages app on iOS, or a third-party application like...
View ArticleHow to Uncover Web Browser Activity Artifacts for Mobile Device Investigations
Web browser activity artifacts are digital clues suspects create when they use web browsers on mobile devices. Browser history, cookies, cache, and file downloads are all web activity artifacts that...
View ArticleThe State of Enterprise DFIR: Share What You’re Seeing in Our Survey!
The State of Enterprise DFIR survey is now open until November 16, 2023. We want to know what you’re noticing in the field of DFIR! That’s why we’re opening our survey for the fourth annual State of...
View ArticleHow to Uncover Application Artifacts for Mobile Device Investigations
Application artifacts are an important data source in mobile device investigations. Identifying what applications are installed on the device and have been in use can be another investigative goal....
View ArticleHow to Uncover Media Artifacts for Mobile Device Investigations
Media artifacts on a device – both captured with the device’s on-board cameras and transmitted to the device through various methods – can be another area of interest during an investigation. Media...
View ArticleMobile Device Artifacts: Exploring Geolocation, Communication, Application...
Mobile device artifacts have grown in importance as cell phones have become an integral part of everyday life (so much so that you can see many videos on social media where users are so engrossed in...
View Article