Leveraging AXIOM Cyber to Accelerate Corporate Investigations
Join us for a webinar focused on how you can use AXIOM Cyber for your corporate investigations, including employee misconduct and harassment cases.
Join us for a webinar focused on how you can use AXIOM Cyber for your corporate investigations, including employee misconduct and harassment cases.
Magnet AXIOM Cyber 6.6 is here, and in this release, we have added new and updated features to help you collect, review, and interpret the evidence you need to keep your investigations moving forward.
Earlier this year, we introduced a new artifact category, volatile artifacts, which allows you to remotely collect live system information. Volatile artifacts are an especially important element of incident response investigations as they can provide unique insights into malware behavior and malicious activities that don’t leave easily detectable evidence trails.
Join Steve Gemperle, Forensic Consultant, for this Tips and Tricks session where he’ll outline how to leverage the search and filtering capabilities of the new Email Explorer in Magnet AXIOM Cyber, narrowing in on specific message times or themes to help streamline the process of reviewing and tagging email evidence.
According to Statista.com in 2022, the global social penetration rate reached 58.4% percent, with Northern Europe and Western Europe having g the highest penetration rate at 85 percent and 84 percent, respectively. As of July 2022, 9 in 10 Internet users have social media accounts per Datareportal. Many technology thought leaders believe social networking will displace traditional email as the leading communication medium.
This presentation will provide a practical walkthrough of preservation of top social media sites and how to effectively utilize tools for evidentiary collection across the Web, PCs/desktops and smart devices. We will look at social media apps on smartphones and what digital evidence exists compared to what can be found on the cloud. We will also explore innovations in emoji/avatar Apps such as Bitmoji.
With Apple’s announcement of iOS 16’s official launch date, as well as providing their latest “gold master” build, we wanted to take a dive into iOS 16 and see what all was going to be new from an analysis and acquisition perspective.
MRU artifacts, or Most Recently Used are a variety of artifacts tracked by modern Windows operating systems that provide crucial details regarding the user’s interaction with files, folders, and programs that may have been executed using the Windows Run utility. This is fortunate for examiners, because profiling user activity is something digital forensic examiners are often tasked with to corroborate what we believe happened on a computer. It is a method for supporting our theory of the user’s behavior on a system.
Sometimes the tools that have been put in place to protect our data can actually become roadblocks in our forensic investigations.
The latest release of AXIOM Cyber – version 6.5 introduces several new and exciting features including: support for Dell Data Protection Encryption (DDPE), new remote volatile artifacts, added evidence sources and features for Email Explorer, and additional artifact details in Timeline view.
When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet AXIOM Cyber offers you an intuitive interface that surfaces time relevant evidence in a visual manner.