Magnet Axiom 8.5: Integrating Magnet One with Axiom for faster, more...
We are thrilled to announce that Magnet Axiom 8.5 is now available! This release integrates Axiom with our new platform, Magnet One, which unifies your digital forensics teams and products to create...
View ArticleMagnet Axiom Cyber 8.5: Collect and preserve cloud data
We’re excited to announce the release of Magnet Axiom Cyber 8.5, which includes new features and improvements such as: The ability to collect and preserve cloud data without automatically processing...
View ArticlePreserve now, process later: Safeguarding sensitive cloud data for HR...
Handling cloud data effectively and securely has become a critical priority for organizations managing human resource investigations, potential litigation, and other sensitive matters. That’s because...
View ArticleLooking back on the Magnet Forensics Open House
In this blog post, Jamey Tubbs, Director of Training Operations, shares a firsthand account of the recent grand opening of Magnet Forensics’ new space in Tysons Corner, Virginia—a free event hosted by...
View ArticleA look into iOS 18’s changes
It’s September! For me, that means the weather is starting to cool off, my favorite sports are in full swing, and Apple is releasing a new version of their iOS operating system. And with a new version...
View ArticleMagnet Griffeye 24.4 and T3K.AI CORE now available!
Version 24.4 of the Magnet Griffeye suite of products is here! This release brings enhancements to Video Signature Matching (VSM) and support for Linux on Processing Nodes. Additionally, T3K.AI CORE...
View Article7 essential artifacts for macOS forensics
In the realm of digital forensics, mac forensics (the investigation of macOS systems) present a unique landscape filled with crucial artifacts that can provide deep insights into user activities,...
View Article7 essential Linux forensics artifacts every investigator should know
Linux systems are a cornerstone of modern computing, powering everything from personal devices to enterprise servers. However, their open nature and flexibility also make them prime targets for...
View ArticleHow Magnet Forensics is helping non-profits in the protection of children
Unlock the truth. Protect the innocent. That’s the mission that drives Magnet Forensics day in and day out. Along the way, we’ve always looked for opportunities to support those that are fighting for...
View ArticleUncovering insider threats with remote endpoint forensics: a case study
In today’s digital age, organizations face significant threats not just from external sources, but from within. Insider threats, particularly involving intellectual property (IP) theft, pose a...
View ArticleSave your spot for Magnet User Summit 2025 in Nashville!
Magnet User Summit is coming back to Nashville March 17-19, 2025! Join us for the DFIR event of the year. This is your chance to get hands-on training and hear about the newest innovations from...
View ArticleReal-time hash matching against NCMEC: Now in Magnet Griffeye products
About a year ago, we announced our partnership with the National Center for Missing and Exploited Children (NCMEC)—the largest and most influential child protection organization in the U.S. Over the...
View ArticleInvestigating data exfiltration: key digital artifacts across Windows, Linux,...
Data exfiltration—the unauthorized transfer of data from a system—can result in severe damage to organizations, making it critical for forensic investigators to identify key digital artifacts that...
View ArticleUnraveling the clues: RDP artifacts in incident response
Remote Desktop Protocol (RDP) is a powerful tool for remote administration, but it can also be a gateway for attackers seeking unauthorized access. For digital forensics professionals, RDP artifacts...
View Article5 iOS forensics evidence sources to capture before they expire
Time is always critical when dealing with criminal investigations, but did you know that some iOS forensics evidence will be lost entirely if it isn’t extracted within a certain window of opportunity?...
View ArticleThe importance of PowerShell logs in digital forensics
PowerShell is a powerful tool within Windows systems, widely used for administrative tasks, automation, and scripting. Unfortunately, due to its powerful scripting capabilities and default presence on...
View ArticleNew certification available for Magnet Griffeye users: MCGF
When your word can make or break a case, your credibility is vital. Without a way to demonstrate your mastery of digital forensics, it can be harder to defend your findings and present them with full...
View ArticleMagnet Axiom Cyber 8.6: Linux support for MITRE ATT&CK framework integration,...
The latest release of Magnet Axiom Cyber introduces several improvements for examiners working on a variety of investigation types, from incident response to internal investigations. Magnet Axiom...
View ArticleMagnet Axiom 8.6: Magnet Copilot offline AI capabilities and more
Magnet Axiom 8.6 introduces a new offline version of the early access to Magnet Copilot’s AI capabilities, helping you easily recognize potentially relevant data in your cases and determine the...
View ArticleMaking Magnet Copilot’s AI capabilities available offline
Across almost every industry and application, advances in AI have been prompting changes that can have major effects on digital forensic examinations. While the rapid development and availability of...
View Article