Linux Remote Acquisition and More Now in Magnet AXIOM Cyber 5.8
AXIOM Cyber 5.8 introduces Linux remote acquisition and automated recovery of BitLocker Recovery IDs for decryption of BitLocker Images.
AXIOM Cyber 5.8 introduces Linux remote acquisition and automated recovery of BitLocker Recovery IDs for decryption of BitLocker Images.
Learn more about how Magnet AXIOM Cyber supports the remote collection of data from Linux operating systems.
Swiftly get a sense of where a photo was taken, a phone call was made, or a chat was sent, and how that location relates to your crime scene.
Hear stories from investigators, examiners, and prosecutors as they show how digital forensics played a pivotal role in solving their cases.
Detective Chad Gish uses digital evidence to uncover a case in this episode of Digital Forensics In Real Life (DFIRL) podcast.
This episode of Digital Forensics In Real Life Podcast Detective Larry McClain tells the story of how digital evidence uncovered the truth in his case.
While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued
Join Trey Amick and Curtis Mutter from Magnet Forensics and learn how to expedite your forensic cloud workflow with AXIOM Cyber. Curtis and Trey will save time at the end of the webinar to answer questions and provide input as to what’s next for AXIOM Cyber’s features.
Join Solutions Consultant, Lynita Hinsch and Sr. Product Manager, Dean Carlson as they demonstrate the added power that AXIOM Cyber has to support you with your corporate investigations and why now might be the right time to make the move to AXIOM Cyber.
Join Dallas Jordan and Craig Guymon from Magnet Forensics and learn how to leverage an AWS EC2 instance with AXIOM Cyber installed on it to remotely collect data from off-network endpoints.