Announcing the MVS 2023 CTF Winners and a NEW CTF Challenge!
Jessica Hyde shares the results from the Magnet Virtual Summit 2023 Capture The Flag competition and also announces a new upcoming CTF!
Jessica Hyde shares the results from the Magnet Virtual Summit 2023 Capture The Flag competition and also announces a new upcoming CTF!
Employee exits are one of the most common times when data is exfiltrated. Join Steve Gemperle, Forensic Consultant, as he discusses how Magnet Forensics’ solutions can be used to protect your company and effectively investigate remote, off-network endpoints and cloud data.
In this video, we introduce Magnet Response, a new free tool from Magnet Forensics that is designed to let investigators and non-technical users easily collect and preserve critical data relevant to incident response investigations from local endpoints. A high-level feature overview will show how Magnet Response can be leveraged in various incident response investigations to … Continued
We’re proud to offer a brand-new free tool for your toolkit, Magnet RESPONSE for incident response investigations!
Learn how to get started with Magnet RESPONSE, an evidence collection and preservation tool, targeted towards incident response (IR) cases.
Many companies have experienced a drastic increase in business email compromise (BEC) attacks, surpassing ransomware as the most prevalent cybersecurity concern. And BEC attacks have grown exponentially more complex, with multiple layers of deception requiring modern DFIR solutions to unravel these complex threats. Using Axiom Cyber, Breadcrumb Cybersecurity have been able to accelerate the rate … Continued
Following ep 2 of Mobile Unpacked, Chris Vance distils information to assist with investigations into iOS’ messaging client.
Facing growing demands from stakeholders both inside and outside the organization (e.g., regulators, insurance carriers, customers, etc.), enterprises are increasingly dependent on in-house and third-party DFIR professionals to locate, extract, process, analyze, and present forensically sound evidence that withstands legal scrutiny and enables informed decisions. This guide shines a light on some of the major … Continued
With the increasing frequency and sophistication of external attacks on business, this session looks at best practices and procedures to investigate cyberattacks and improve your company’s security posture. Certificates After viewing this webinar, you can download a certificate of completion from the event console.
That’s a wrap on another amazing installment of Magnet Virtual Summit! Get caught up on what happened at the virtual DFIR event of the year.