Magnet Virtual Summit: Get Your Presentation Submissions in for the 2023 Call for Papers!
We’re excited to be bringing back Magnet Virtual Summit to DFIR experts and newcomers alike from February 21-March 2, 2023!
We’re excited to be bringing back Magnet Virtual Summit to DFIR experts and newcomers alike from February 21-March 2, 2023!
MRU artifacts, or Most Recently Used are a variety of artifacts tracked by modern Windows operating systems that provide crucial details regarding the user’s interaction with files, folders, and programs that may have been executed using the Windows Run utility. This is fortunate for examiners, because profiling user activity is something digital forensic examiners are often tasked with to corroborate what we believe happened on a computer. It is a method for supporting our theory of the user’s behavior on a system.
Sometimes the tools that have been put in place to protect our data can actually become roadblocks in our forensic investigations.
Magnet AXIOM 6.5 is now available with new enhancements for Timeline and Media Explorer so you can uncover and manage your case evidence with ease.
The latest release of AXIOM Cyber – version 6.5 introduces several new and exciting features including: support for Dell Data Protection Encryption (DDPE), new remote volatile artifacts, added evidence sources and features for Email Explorer, and additional artifact details in Timeline view.
When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet AXIOM Cyber offers you an intuitive interface that surfaces time relevant evidence in a visual manner.
In this series, we walk through how to ingest images from a variety of third party sources into Magnet AXIOM.
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.
Here are a few mobile device forensics dos and don’ts that can help you and your agency ensure you are following best practices.
In this blog, we will provide best practices for examining mobile consent devices, so you are well equipped to process it.