7 essential Linux forensics artifacts every investigator should know
As part of our support of Linux artifacts, we’ve focused on some foundational OS artifacts that will help move your investigations along.
As part of our support of Linux artifacts, we’ve focused on some foundational OS artifacts that will help move your investigations along.
In the realm of digital forensics, mac forensics (the investigation of macOS systems) present a unique landscape filled with crucial artifacts that can provide deep insights into user activities, system events, and potential security breaches. Whether you’re investigating a criminal case, responding to an insider threat, or managing a cybersecurity incident, understanding these key forensic … Continued
It’s September! For me, that means the weather is starting to cool off, my favorite sports are in full swing, and Apple is releasing a new version of their iOS operating system. And with a new version of iOS, comes a new version of my yearly blog hopefully preparing examiners with what iOS 18 new … Continued
In this blog post, Jamey Tubbs, Director of Training Operations, shares a firsthand account of the recent grand opening of Magnet Forensics’ new space in Tysons Corner, Virginia—a free event hosted by the Magnet Forensics Training team, where they offered product demonstrations, training presentations, networking activities, and special prizes! On August 23, Magnet Forensics hosted … Continued
Handling cloud data effectively and securely has become a critical priority for organizations managing human resource investigations, potential litigation, and other sensitive matters. That’s because much of today’s business-critical data like communications and sensitive documents may be stored in the cloud. According to the Flexera 2024 State of the Cloud Report, more organizations are adopting … Continued
We’re excited to announce the release of Magnet Axiom Cyber 8.5, which includes new features and improvements such as: We’ve also updated and added to our artifact support (additional details are at the end of this blog.) Upgrade to Axiom Cyber 8.5 within the Axiom Cyber interface or through the Customer Portal. Haven’t tried Axiom … Continued
With ever-growing volumes of mobile device data involved in today’s crimes, we know that mobile investigations are by far the top priority in most agencies today. With our first step in realizing the vast potential of Magnet One, we’re focusing on enhancing your mobile investigations with the combination of Magnet Graykey/Verakey and Magnet Axiom/Axiom Cyber, … Continued
The exponential growth of digital evidence is a well-known struggle for agencies worldwide. The entire agency feels the strain, from overwhelmed digital forensics labs to detectives awaiting critical analysis. Funding, managing, and storing these ever-increasing data volumes pose significant challenges. In April, at our annual Magnet User Summit, we shared our plans for revolutionizing the … Continued
The exponential growth of digital evidence is a well-known struggle for agencies worldwide. The entire agency feels the strain,
Windows Recycle Bin in Digital Forensics The Windows Recycle Bin, a seemingly simple feature, has undergone significant changes across different versions of the Windows operating system. This artifact is not just a virtual trash can but a critical element in digital forensic investigations. Understanding its evolution and functionality can provide valuable insights into user activity … Continued