A Guide to Peak Software Performance for Magnet AXIOM
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
In Part 1 of this two-part Mobile Unpacked series, we explored the storage structures of the most popular file browser/storage applications in iOS and Android. In this part, we’ll dive deeper using these applications as our starting point to figure out how files got to where they ended up. This presentation will discuss file movement, … Continued
If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.
GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to data only available in an iTunes backup and only if you had the user’s passcode—with Android acquisitions not being much easier.
We are happy to announce the release of Magnet AXIOM Cyber 7.2. In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated artifacts to keep your evidence sources current with the latest corporate applications and services. You can upgrade to the latest … Continued
Digital forensic workflows can be highly manual and time-consuming. Disconnected tools and manual touchpoints bog down DFIR teams—resulting in slower investigations and wasted resources. Increasing case volume and data only makes the struggle to keep up worse. It can take days or weeks to manually and sequentially collect the data required for thorough investigations. Magnet … Continued
Recently, I have seen user questions about hardware choices as it relates to performance with Magnet AXIOM or Magnet AXIOM Cyber. When it comes down to it, we all want our cases processed faster!
With the complexity and frequency of cyber threats targeting businesses growing at alarming rates, digital forensics and incident response (DFIR) has become an indispensable component of cybersecurity programs. DFIR teams in corporate environments are increasingly called on to unravel complex threats and uncover critical insights into incident response investigations, including ransomware attacks, data exfiltration, and … Continued
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering a new attack by a nation-state sponsored attacker dubbed as “Volt Typhoon” (also called BRONZE SILHOUETTE) where the threat actor leverages fileless techniques also known as “Living-Off-The-Land” (LOTL) techniques.