Introducing Custom Targeted Locations with Magnet AXIOM Cyber

Since AXIOM Cyber’s inception we’ve made remote collection of artifacts that are frequently needed for investigations by including a list of preconfigured Targeted Locations. Evidence such as browser history, the $MFT, Pagefile.sys, registry files, and the macOS unified logs have quickly been accessible to users without examiners needing to remember the path locations, and manually … Continued

Yep, Magnet AXIOM Cyber Supports Slack!

As many of us know, Slack has become a dominant collaboration and chat platform used in environments around the globe since its inception in 2009. With over 10 million daily active users and 85,000 paying customers, examiners are frequently facing casework where Slack data plays a pivotal part in the investigation.  In this blog, we’ll discuss the different options examiners have when investigating Slack with Magnet … Continued