Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Magnet Axiom 8.5: Integrating Magnet One with Axiom for faster, more...

We are thrilled to announce that Magnet Axiom 8.5 is now available! This release integrates Axiom with our new platform, Magnet One, which unifies your digital forensics teams and products to create...

View Article


Image may be NSFW.
Clik here to view.

Magnet Axiom Cyber 8.5: Collect and preserve cloud data

We’re excited to announce the release of Magnet Axiom Cyber 8.5, which includes new features and improvements such as: The ability to collect and preserve cloud data without automatically processing...

View Article


Image may be NSFW.
Clik here to view.

Preserve now, process later: Safeguarding sensitive cloud data for HR...

Handling cloud data effectively and securely has become a critical priority for organizations managing human resource investigations, potential litigation, and other sensitive matters. That’s because...

View Article

Image may be NSFW.
Clik here to view.

Looking back on the Magnet Forensics Open House 

In this blog post, Jamey Tubbs, Director of Training Operations, shares a firsthand account of the recent grand opening of Magnet Forensics’ new space in Tysons Corner, Virginia—a free event hosted by...

View Article

Image may be NSFW.
Clik here to view.

A look into iOS 18’s changes

It’s September! For me, that means the weather is starting to cool off, my favorite sports are in full swing, and Apple is releasing a new version of their iOS operating system. And with a new version...

View Article


Magnet Griffeye 24.4 and T3K.AI CORE now available! 

Version 24.4 of the Magnet Griffeye suite of products is here! This release brings enhancements to Video Signature Matching (VSM) and support for Linux on Processing Nodes. Additionally, T3K.AI CORE...

View Article

Image may be NSFW.
Clik here to view.

7 essential artifacts for macOS forensics

In the realm of digital forensics, mac forensics (the investigation of macOS systems) present a unique landscape filled with crucial artifacts that can provide deep insights into user activities,...

View Article

Image may be NSFW.
Clik here to view.

7 essential Linux forensics artifacts every investigator should know

Linux systems are a cornerstone of modern computing, powering everything from personal devices to enterprise servers. However, their open nature and flexibility also make them prime targets for...

View Article


How Magnet Forensics is helping non-profits in the protection of children 

Unlock the truth. Protect the innocent.  That’s the mission that drives Magnet Forensics day in and day out. Along the way, we’ve always looked for opportunities to support those that are fighting for...

View Article


Image may be NSFW.
Clik here to view.

Uncovering insider threats with remote endpoint forensics: a case study 

In today’s digital age, organizations face significant threats not just from external sources, but from within. Insider threats, particularly involving intellectual property (IP) theft, pose a...

View Article

Save your spot for Magnet User Summit 2025 in Nashville! 

Magnet User Summit is coming back to Nashville March 17-19, 2025!  Join us for the DFIR event of the year. This is your chance to get hands-on training and hear about the newest innovations from...

View Article

Real-time hash matching against NCMEC: Now in Magnet Griffeye products 

About a year ago, we announced our partnership with the National Center for Missing and Exploited Children (NCMEC)—the largest and most influential child protection organization in the U.S. Over the...

View Article

Image may be NSFW.
Clik here to view.

Investigating data exfiltration: key digital artifacts across Windows, Linux,...

Data exfiltration—the unauthorized transfer of data from a system—can result in severe damage to organizations, making it critical for forensic investigators to identify key digital artifacts that...

View Article


Image may be NSFW.
Clik here to view.

Unraveling the clues: RDP artifacts in incident response 

Remote Desktop Protocol (RDP) is a powerful tool for remote administration, but it can also be a gateway for attackers seeking unauthorized access. For digital forensics professionals, RDP artifacts...

View Article

Image may be NSFW.
Clik here to view.

5 iOS forensics evidence sources to capture before they expire

Time is always critical when dealing with criminal investigations, but did you know that some iOS forensics evidence will be lost entirely if it isn’t extracted within a certain window of opportunity?...

View Article


Image may be NSFW.
Clik here to view.

The importance of PowerShell logs in digital forensics 

PowerShell is a powerful tool within Windows systems, widely used for administrative tasks, automation, and scripting. Unfortunately, due to its powerful scripting capabilities and default presence on...

View Article

New certification available for Magnet Griffeye users: MCGF 

When your word can make or break a case, your credibility is vital. Without a way to demonstrate your mastery of digital forensics, it can be harder to defend your findings and present them with full...

View Article


Image may be NSFW.
Clik here to view.

Magnet Axiom Cyber 8.6: Linux support for MITRE ATT&CK framework integration,...

The latest release of Magnet Axiom Cyber introduces several improvements for examiners working on a variety of investigation types, from incident response to internal investigations.   Magnet Axiom...

View Article

Image may be NSFW.
Clik here to view.

Magnet Axiom 8.6: Magnet Copilot offline AI capabilities and more

Magnet Axiom 8.6 introduces a new offline version of the early access to Magnet Copilot’s AI capabilities, helping you easily recognize potentially relevant data in your cases and determine the...

View Article

Image may be NSFW.
Clik here to view.

Making Magnet Copilot’s AI capabilities available offline

Across almost every industry and application, advances in AI have been prompting changes that can have major effects on digital forensic examinations. While the rapid development and availability of...

View Article
Browsing all 1190 articles
Browse latest View live