A Guide to Peak Software Performance for Magnet AXIOM
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.
GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to data only available in an iTunes backup and only if you had the user’s passcode—with Android acquisitions not being much easier.
On this episode of Digital Forensics in Real Life Aaron Sparling, a veteran of the Portland Police Bureau, discusses his work on the 2018 murder case of Daniel Brophy. Daniel was killed by his wife, Nancy Crampton-Brophy, at the Oregon Culinary Institute where he worked as an instructor. Nancy – who published an online essay … Continued
We are thrilled to announce the release of Magnet AXIOM 7.2! This latest release introduces new features to help make it easier to access, view, and verify critical information from mobile sources for your investigations, including:
We are happy to announce the release of Magnet AXIOM Cyber 7.2. In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated artifacts to keep your evidence sources current with the latest corporate applications and services. You can upgrade to the latest … Continued
Recently, I have seen user questions about hardware choices as it relates to performance with Magnet AXIOM or Magnet AXIOM Cyber. When it comes down to it, we all want our cases processed faster!
Privacy is becoming increasingly prevalent in everyone’s day-to-day vocabulary. Over the past five years we have seen a surge in illegal activities taking place in the dark web market vendor space, with many of these transactions having devastating impacts on our communities due to the rise in fentanyl deaths caused from overdoses.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering a new attack by a nation-state sponsored attacker dubbed as “Volt Typhoon” (also called BRONZE SILHOUETTE) where the threat actor leverages fileless techniques also known as “Living-Off-The-Land” (LOTL) techniques.