ShimCache vs AmCache: Key Windows Forensic Artifacts
In digital forensics, Windows operating systems leave behind a wealth of forensic artifacts that can be invaluable in investigations. Among the key artifacts are ShimCache (Application Compatibility...
View ArticleMeet compliance needs with category extractions in Magnet Verakey
In today’s digital investigations, smartphones hold vast amounts of potentially critical insights. For many of us, our smartphone has become central to our daily lives. On one device there can be tens...
View ArticleMagnet Griffeye 24.5 and Project VIC GID now available
Magnet Forensics is excited to announce the release of version 24.5 of the Magnet Griffeye suite! This update brings key enhancements to the Griffeye Intelligence Database (GID) in Griffeye Operations...
View ArticleThat one artifact: Metadata’s role in a complex child exploitation case
In this series, Chad Gish, CID/SISU Detective, Metropolitan Nashville Police Department will delve into some noteworthy cases in his 26-year career, focusing on investigations that were either...
View Article10 reasons you should be using cloud-based forensics solutions
The digital forensics and incident response (DFIR) landscape is in the middle of a revolution, thanks to the adoption of cloud-based forensic solutions. Some of the transformative benefits of...
View ArticleQuickly uncover the history of your case with Magnet Review’s Timeline View
Magnet Review empowers your investigative team members—both inside and outside your organization—to securely collaborate and review digital evidence from any of your data sources anywhere in the...
View ArticleDigital forensic tools: Why ease of use is essential
The digital forensic tools we rely on must not only be powerful enough to perform deep dives into intricate data sources, but also intuitive enough for a diverse range of users. Digital forensic...
View ArticleUnderstanding the security impacts of iOS 18’s inactivity reboot
Beginning with iOS 18, Apple has added an inactivity reboot timer into the operating system that is tied only to the device’s lock state. This means that when the device has been locked for a period...
View ArticleUnveiling the presentation catalog at Magnet User Summit 2025
We’re extremely proud to share our incredible lineup for Magnet User Summit 2025 in Nashville March 17-19! With three renowned guest speakers offering keynote presentations, a comprehensive kick-off...
View ArticleMagnet Virtual Summit 2025: register now for the virtual DFIR event of the...
Magnet Virtual Summit returns this February—giving attendees of all skill levels another great chance to get an Investigative Edge with Magnet Forensics products and catch up on the latest trends and...
View ArticleAI in law enforcement and the future of digital forensics
In modern criminal investigations, digital evidence—including emails, text messages, phone records, video footage, social media posts, and cloud-stored information—often holds more value than physical...
View ArticleMagnet Axiom Cyber 8.7: Acquire iCloud backups from ADP-enabled accounts, and...
The latest release of Magnet Axiom Cyber introduces several important improvements for examiners working on a variety of investigation types, from incident response to internal investigations. Magnet...
View ArticleMagnet Axiom 8.7: Initiate processing from Magnet Graykey Fastrak and more!
Magnet Axiom 8.7 was just released introducing several new and improved features and capabilities to help you work as efficiently as possible and gather the most data for your investigations. This...
View ArticleStreamlining mobile extractions and processing with Magnet Graykey Fastrak...
With the number of mobile devices exceeding the global population, evidence from smartphones plays an essential role in criminal investigations. But as mobile devices continue to grow in storage...
View ArticleEnterprise forensics: Why scalable solutions matter
Organizations in the private sector face significant complexity when performing enterprise forensics investigations, whether it’s in support of incident response, internal investigation, or...
View ArticleMagnet Virtual Summit 2025 Capture The Flag
Hi! This is Jessica Hyde and I am so excited to announce the exciting plans for the Magnet Virtual Summit Capture The Flag (CTF) powered by Hexordia. I have been having a blast working with our...
View ArticleIntroducing Magnet Verify: The next evolution of Medex
We are excited to announce that Medex, the trusted solution for authenticating media and countering manipulated content, is now officially part of the Magnet Forensics family! As we continue to grow...
View ArticleMagnet Axiom 8.8: Chat threads in Exhibit Builder, Email threads in Email...
Our final Magnet Axiom release of 2024 is out now, adding several improvements to the features and capabilities of Axiom to help you advance your investigations as efficiently as possible. This...
View ArticleMagnet Axiom Cyber 8.8: Email threads in Email Explorer, chat threads in...
It’s this year’s final release of Axiom Cyber, and we’ve added several improvements to help you complete your investigations as efficiently as possible. Magnet Axiom Cyber 8.8 includes: Chat threads...
View ArticleThe role of AI and digital forensics in modern policing
Artificial intelligence (AI) is impacting technology in every area—including digital forensics. AI tools are already enhancing investigative capabilities and addressing important concerns, including...
View Article