A Guide to Peak Software Performance for Magnet AXIOM
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
In Part 1 of this two-part Mobile Unpacked series, we explored the storage structures of the most popular file browser/storage applications in iOS and Android. In this part, we’ll dive deeper using these applications as our starting point to figure out how files got to where they ended up. This presentation will discuss file movement, … Continued
With iOS and Android both having file storage accessible for the end user, they need some sort of app to allow for the user to access these areas. While the entire file system is not available to the user, understanding where the data the user can access lives is crucial. This Mobile Unpacked episode is … Continued
All too often during an investigation, it comes to light that adversaries are leveraging existing remote access tools for initial access and lateral movement. This trend is continuously on the rise and tends to go unnoticed due to the lack of available logging or not understanding what the available logs provide. This talk will not … Continued
With the continued development of augmented and virtual reality, investigators in law enforcement and the private sector are starting to encounter crimes happening in the “Metaverse”. What methods can we use to extract data from Oculus devices and what challenges can we expect? This talk will dive into methods to get after the data from … Continued
If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.
We are happy to announce the release of Magnet AXIOM Cyber 7.2. In this release, we have added support for SHA256 hash calculations, an improved the viewer for LevelDB files, and added new and updated artifacts to keep your evidence sources current with the latest corporate applications and services. You can upgrade to the latest … Continued
With the complexity and frequency of cyber threats targeting businesses growing at alarming rates, digital forensics and incident response (DFIR) has become an indispensable component of cybersecurity programs. DFIR teams in corporate environments are increasingly called on to unravel complex threats and uncover critical insights into incident response investigations, including ransomware attacks, data exfiltration, and … Continued
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering a new attack by a nation-state sponsored attacker dubbed as “Volt Typhoon” (also called BRONZE SILHOUETTE) where the threat actor leverages fileless techniques also known as “Living-Off-The-Land” (LOTL) techniques.