Magnet Axiom Cyber 7.9: Faster mobile processing, better video performance, new custom fields, and more
The release of Magnet AXIOM Cyber 7.9 is here, and it’s an exciting one for digital forensic examiners who support eDiscovery stakeholders.
The release of Magnet AXIOM Cyber 7.9 is here, and it’s an exciting one for digital forensic examiners who support eDiscovery stakeholders.
In this article we will cover the basics of what a software kernel is, the application of software kernels in the context of digital forensic examinations, and we’ll shed some light on how kernels contribute to the acquisition and analysis of data during a forensic investigation.
Magnet Virtual Summit is back this February—giving attendees of all skill levels another great chance to catch up on the latest trends and challenges in DFIR from a huge selection of the leading voices in the DFIR field.
In today’s digital age, the use of mobile devices has become pervasive across different domains. With the increase in usage, the role of geolocation in mobile device investigations has become more crucial than ever.
We’ve integrated Magnet AUTOMATE Enterprise with CrowdStrike Falcon Real Time Response to help instantly perform forensic collection and process endpoints at enterprise scale.
We’re excited to announce that automated cloud acquisitions are available in Magnet AUTOMATE Enterprise automated workflows!
Infostealers are a type of malware specifically designed to locate and exfiltrate credentials. Their prevalence and impact were limited pre-COVID-19 as most of the headlines were grabbed by ransomware operations that crippled large organizations.
In this solution brief, learn how Magnet AUTOMATE complements SOAR solutions to enable immediate and automatic collections and forensic processing at scale.
Cybersecurity teams need to prioritize developing, implementing, and updating their incident response playbooks.
SRUM, or System Resource Utilization Monitor, is a feature of modern Windows systems (Win8+), intended to track the application usage, network utilization and system energy state. SRUM, as with most operating system features, wasn’t designed for the forensicator, but that doesn’t mean we can’t use it to support our investigations.