Magnet Axiom Cyber 8.6: Linux support for MITRE ATT&CK framework integration, Comae memory analysis improvements, and offline access to Magnet Copilot

The latest release of Magnet Axiom Cyber introduces several improvements for examiners working on a variety of investigation types, from incident response to internal investigations.   Magnet Axiom Cyber 8.6 includes an array of new features and improvements, such as:  We’ve also updated and added to our artifact support (full details at the end of … Continued

7 essential artifacts for macOS forensics

In the realm of digital forensics, mac forensics (the investigation of macOS systems) present a unique landscape filled with crucial artifacts that can provide deep insights into user activities, system events, and potential security breaches. Whether you’re investigating a criminal case, responding to an insider threat, or managing a cybersecurity incident, understanding these key forensic … Continued

Magnet Griffeye 24.4 and T3K.AI CORE now available! 

Version 24.4 of the Magnet Griffeye suite of products is here! This release brings enhancements to Video Signature Matching (VSM) and support for Linux on Processing Nodes. Additionally, T3K.AI CORE is now officially available across Griffeye products.   T3K.AI CORE now available in Magnet Griffeye Products  We are excited to announce the full integration of T3K.AI’s … Continued

Preserve now, process later: Safeguarding sensitive cloud data for HR investigations and eDiscovery

Handling cloud data effectively and securely has become a critical priority for organizations managing human resource investigations, potential litigation, and other sensitive matters. That’s because much of today’s business-critical data like communications and sensitive documents may be stored in the cloud. According to the Flexera 2024 State of the Cloud Report, more organizations are adopting … Continued

Magnet Axiom Cyber 8.5: Collect and preserve cloud data

We’re excited to announce the release of Magnet Axiom Cyber 8.5, which includes new features and improvements such as: We’ve also updated and added to our artifact support (additional details are at the end of this blog.) Upgrade to Axiom Cyber 8.5 within the Axiom Cyber interface or through the Customer Portal.  Haven’t tried Axiom … Continued

Magnet Axiom 8.5: Integrating Magnet One with Axiom for faster, more effective investigations 

We are thrilled to announce that Magnet Axiom 8.5 is now available! This release integrates Axiom with our new platform, Magnet One, which unifies your digital forensics teams and products to create greater efficiency across the entire digital investigation lifecycle.   In addition to the integration with Magnet One, this release also includes new and updated … Continued

Integrating Magnet Graykey and Magnet Axiom with Magnet One for faster mobile investigations

With ever-growing volumes of mobile device data involved in today’s crimes, we know that mobile investigations are by far the top priority in most agencies today.   With our first step in realizing the vast potential of Magnet One, we’re focusing on enhancing your mobile investigations with the combination of Magnet Graykey/Verakey and Magnet Axiom/Axiom Cyber, … Continued

Magnet One now available: Experience the future of digital investigations today!

The exponential growth of digital evidence is a well-known struggle for agencies worldwide. The entire agency feels the strain, from overwhelmed digital forensics labs to detectives awaiting critical analysis. Funding, managing, and storing these ever-increasing data volumes pose significant challenges.  In April, at our annual Magnet User Summit, we shared our plans for revolutionizing the … Continued

Digital Forensics: Artifact Profile – Windows Recycle Bin

Windows Recycle Bin in Digital Forensics The Windows Recycle Bin, a seemingly simple feature, has undergone significant changes across different versions of the Windows operating system. This artifact is not just a virtual trash can but a critical element in digital forensic investigations. Understanding its evolution and functionality can provide valuable insights into user activity … Continued