S3:E6 // Aligning on Android acquisitions
How many different ways are there to get Android data? What’s the difference between agent-based extractions and ADB acquisitions?
How many different ways are there to get Android data? What’s the difference between agent-based extractions and ADB acquisitions?
A key consideration in any digital forensic examination in the public safety sector is ensuring that the evidence would be court-ready.
In this guide, we present eight different—albeit often interrelated—strategies that service providers can employ to grow top-line revenue and/or to lower costs.
With the recent Magnet Axiom and Axiom Cyber 9.0 releases we added several new and exciting capabilities. In the short time since that release, we’ve continued to roll out updates refining and iterating on those features. In addition to continually expanding and updating the artifact support to help provide insights from the latest apps and … Continued
Did you hear the news? Magnet User Summit and Magnet Virtual Summit are coming back in 2026 to help redefine and rediscover what’s possible in DFIR in 2026! Magnet Virtual Summit will take place February 23-27 while Magnet User Summit returns to Nashville April 20-22—and we’re opening submissions for speaking spots at both events. Magnet … Continued
Digital forensic consultants are constantly faced with unfamiliar hardware, technologies, data structures, and problems. While this makes our work exciting, it also makes it challenging. How do you approach solving a problem you haven’t faced before? How do you navigate roadblocks that seem insurmountable? How do you know when a promising lead becomes a rabbit hole that you need to stop following?
Our Training team continues to grow. In our latest “Meet the Forensic Trainer” blog, meet Wisconsin, USA-based Anthony Reince! Want a chance to learn from Anthony in the classroom? Learn more about what courses are offered through our Training & Certification portal. MF: Tell us about your life before becoming a Trainer. AR: Prior … Continued
This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are prefetch files? Prefetch files are great artifacts for forensic investigators trying to analyze applications that have been run on a system. Windows creates a prefetch file when an application is … Continued
This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK files? LNK files are a relatively simple but valuable artifact for the forensics investigator. Shortcut files link to an application or file commonly found on a user’s desktop or … Continued
Data leakage incidents are an ongoing source of concern for all organizations. They can cost millions of dollars in fines from regulatory agencies and litigation, and may cause reputational damage—all of which can take years to recover from.
Notifications