How to Work With Privileged Material
Adhere to privilege material workflows and reduce the risk of inadvertent exposure or misuse of privileged material in AXIOM/AXIOM Cyber 7.0.
Adhere to privilege material workflows and reduce the risk of inadvertent exposure or misuse of privileged material in AXIOM/AXIOM Cyber 7.0.
We’re continuing to make collaboration easier and more efficient across our products with tag syncing from AXIOM to REVIEW.
With the release of Magnet AXIOM 7.0, we’re excited to introduce the integration of Thorn’s advanced AI model: the CSAM Image Classifier.
Michael Paleshi from the Magnet Forensics Product Management team explores some of the new artifacts found in AXIOM & AXIOM Cyber 7.0.
Meet the 2022 winners of the Magnet Forensics Scholarship Award, which helps agencies with limited DFIR capacity to get to the truth.
Learn more about what makes a strong Digital Forensics Team? And the 5 signs to look for.
Magnet OUTRIDER 3.4 introduces a new licensing upgrade where you can bring your own device for use of OUTRIDER, as well as Dark Mode.
Hashcat is a popular password-cracking tool that security professionals, researchers, and digital forensic specialists use to recover lost or forgotten passwords. It works by taking a password hash, a unique alphanumeric representation of a password, and using numerous attacks to guess the password that produced the hash. Hashcat is fast and efficient, making it a powerful tool for password recovery.
Every case involves a mobile device. That means that we have to start prioritizing the devices as well as how much we want from them. Sometimes, we don’t want to (or can’t) collect everything due to scope or simply time to evidence. How can examiners quickly diagnose mobile devices with triage techniques? This episode will … Continued
Jessica Hyde shares the results from the Magnet Virtual Summit 2023 Capture The Flag competition and also announces a new upcoming CTF!