Magnet Virtual Summit: Get Your Presentation Submissions in for the 2023 Call for Papers!
We’re excited to be bringing back Magnet Virtual Summit to DFIR experts and newcomers alike from February 21-March 2, 2023!
We’re excited to be bringing back Magnet Virtual Summit to DFIR experts and newcomers alike from February 21-March 2, 2023!
MRU artifacts, or Most Recently Used are a variety of artifacts tracked by modern Windows operating systems that provide crucial details regarding the user’s interaction with files, folders, and programs that may have been executed using the Windows Run utility. This is fortunate for examiners, because profiling user activity is something digital forensic examiners are often tasked with to corroborate what we believe happened on a computer. It is a method for supporting our theory of the user’s behavior on a system.
Beginning with the iPhone 11, Apple introduced the U1 chip which utilizes a short-range, low energy, wireless communications protocol.
Sometimes the tools that have been put in place to protect our data can actually become roadblocks in our forensic investigations.
Magnet AXIOM 6.5 is now available with new enhancements for Timeline and Media Explorer so you can uncover and manage your case evidence with ease.
The latest release of AXIOM Cyber – version 6.5 introduces several new and exciting features including: support for Dell Data Protection Encryption (DDPE), new remote volatile artifacts, added evidence sources and features for Email Explorer, and additional artifact details in Timeline view.
When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet AXIOM Cyber offers you an intuitive interface that surfaces time relevant evidence in a visual manner.
Investigations that center around media review and analysis often require additional examination time as lab personnel have to examine images and video found on devices.
In this series, we walk through how to ingest images from a variety of third party sources into Magnet AXIOM.
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.