Meet the Magnet Forensics Training Team: Wilton Cleveland
Get to know more about the approaches and background one of the newest additions to the Magnet Forensics Training team, Wilton Cleveland.
Get to know more about the approaches and background one of the newest additions to the Magnet Forensics Training team, Wilton Cleveland.
We are happy to announce the release of Magnet AXIOM Cyber 7.3. This release adds a new option to connect to VeraKey, making it even easier for you to quickly collect and process mobile data for your eDiscovery and internal investigations. We have also added a new exporting capability for AXIOM Cyber that builds on the privileged material feature, and added to the SHA256 support introduced in AXIOM Cyber 7.2.
We’re excited to announce the release of Magnet AXIOM 7.3! This latest version introduces a number of new features to help make your digital evidence analysis and reporting faster and easier, along with several new and updated artifacts.
Regardless of how you entered the field of digital forensics, it is common to feel a little lost in the beginning. So, if you’re brand new to this field or would like a refresher on understanding digital forensics, this blog is for you.
Organizations leveraging VeraKey for their consent-based mobile device extractions are provided access to full file system acquisitions of both iOS and Android devices.
TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.
GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to data only available in an iTunes backup and only if you had the user’s passcode—with Android acquisitions not being much easier.