How to Remotely Acquire from Mac Endpoints Using AXIOM Cyber’s Signed Agent and Jamf Pro
Here’s how you can easily and consistently collect from remote Mac endpoints with AXIOM Cyber’s signed Mac agent.
Here’s how you can easily and consistently collect from remote Mac endpoints with AXIOM Cyber’s signed Mac agent.
This integration will allow customers to seamlessly deploy the new signed Mac agent from Magnet AXIOM Cyber—Magnet Forensics’ robust digital forensics and incident response solution for organizations—onto their macOS endpoints using the Jamf platform.
Digital forensics has become an indispensable part of cybersecurity programs. That’s largely driven by the harsh reality that falling victim to a security event isn’t a matter of if, but of when.
We are happy to announce the release of Magnet AXIOM Cyber 7.3. This release adds a new option to connect to VeraKey, making it even easier for you to quickly collect and process mobile data for your eDiscovery and internal investigations. We have also added a new exporting capability for AXIOM Cyber that builds on the privileged material feature, and added to the SHA256 support introduced in AXIOM Cyber 7.2.
Organizations leveraging VeraKey for their consent-based mobile device extractions are provided access to full file system acquisitions of both iOS and Android devices.
TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.
We are happy to announce the release of Magnet AXIOM Cyber 7.2. In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated artifacts to keep your evidence sources current with the latest corporate applications and services. You can upgrade to the latest … Continued
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering a new attack by a nation-state sponsored attacker dubbed as “Volt Typhoon” (also called BRONZE SILHOUETTE) where the threat actor leverages fileless techniques also known as “Living-Off-The-Land” (LOTL) techniques.