Comae Memory and network analysis: Beginning an incident investigation

A common scenario for SOC’s and IR teams is being handed a piece of evidence and being asked to “Find Evil.” Those on the receiving end know this to be a broad ask. If there is a known good image to compare things to, the process may be easier, but not all organizations have a gold build available for comparison.

8 Log files you can collect from iOS and Android devices

If you tuned in to the 2024 MVS presentation, “Logging La Vida Loca,” or Episode 14 of Mobile Unpacked, then you may be wondering where you can get a cheatsheet or copy of all the locations and types of logging data you can gather in your investigations. Well, look no further than this blog post!

First generation CSAM detector in Magnet Outrider

Sadly, one of the common investigation types that forensic teams get the call to investigate is Child Sexual Abuse Material (CSAM). The latest development in Magnet OUTRIDER equips your team with the tools they need to identify newly created CSAM that has yet to be reported and hashed.

Software kernels: Unraveling digital forensics intricacies

In this article we will cover the basics of what a software kernel is, the application of software kernels in the context of digital forensic examinations, and we’ll shed some light on how kernels contribute to the acquisition and analysis of data during a forensic investigation.