Announcing the Winners of the 2022 Magnet Forensics CTF
The June 2022 Magnet Forensics CTF was another exciting competition, and we’re happy to announce the winners!
The June 2022 Magnet Forensics CTF was another exciting competition, and we’re happy to announce the winners!
To combat a Child Sexual Abuse Material (CSAM) case, an agency turned to Magnet GRAYKEY to process multiple smartphones. This case study details the events of their investigation and how GRAYKEY helped bring justice to the victims. Note: Due to the sensitivity of this case, and to respect the victims, this case study is anonymous.
When analyzing malware and exploits (or troubleshooting issues), you’ll find it in memory—even if it can’t be found on disk. Memory will give you a look at the exact state of a device at a specific time; this is why memory analysis, or memory forensics, is important to DFIR (Digital Forensics and Incident Response).
Insider threats, whether due to malicious action, inadvertent breaches, or negligence, put your company at risk of potentially significant financial and reputational consequences.
La evidencia en video puede ser tan voluminosa como los datos de un dispositivo móvil, incluso más, y la problemática radica en que hay pocas herramientas disponibles para mejorar y analizar videos de manera confiable según la Asociación Internacional de Jefes de Policía (International Association of Chiefs of Police).
¿alguna vez ha tenido que acudir a la oficina o laboratorio durante el fin de semana o después de las horas laborales para iniciar un proceso forense con urgencia?
We’re excited to introduce Comae to Magnet Idea Lab—giving you a chance to beta test the solution and give us valuable feedback!
As part of the continuous development of Magnet AXIOM Cyber’s incident response capabilities, we’ve integrated VirusTotal giving you the ability to quickly check files against their database of known threats.
Only two months after the release Magnet AXIOM Cyber 6.0, we’ve delivered several new and exciting features in Magnet AXIOM Cyber 6.2, including:
Modernizing digital forensics workflows is now essential, since the threat landscape for enterprise Digital Forensics and Incident Response (DFIR) professionals has never been more challenging: