AI Unpacked #3 : Digital crossroads — the intersection of AI and the law
A key consideration in any digital forensic examination in the public safety sector is ensuring that the evidence would be court-ready.
A key consideration in any digital forensic examination in the public safety sector is ensuring that the evidence would be court-ready.
With the recent Magnet Axiom and Axiom Cyber 9.0 releases we added several new and exciting capabilities. In the short time since that release, we’ve continued to roll out updates refining and iterating on those features. In addition to continually expanding and updating the artifact support to help provide insights from the latest apps and … Continued
Did you hear the news? Magnet User Summit and Magnet Virtual Summit are coming back in 2026 to help redefine and rediscover what’s possible in DFIR in 2026! Magnet Virtual Summit will take place February 23-27 while Magnet User Summit returns to Nashville April 20-22—and we’re opening submissions for speaking spots at both events. Magnet … Continued
Digital forensic consultants are constantly faced with unfamiliar hardware, technologies, data structures, and problems. While this makes our work exciting, it also makes it challenging. How do you approach solving a problem you haven’t faced before? How do you navigate roadblocks that seem insurmountable? How do you know when a promising lead becomes a rabbit hole that you need to stop following?
Many prosecutors have stated that digital forensics is now more important than DNA forensics. In this webinar, we will discuss the six basic pillars of digital forensics and investigations. This webinar is provided to set a baseline of some of the basic digital forensic items, why they are so important and how they can provide a huge impact for your case.
For law enforcement, time, money, and resources are always difficult to get—so how can you get the most out of your budgets without compromising the quality of your officers’ training?
This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are prefetch files? Prefetch files are great artifacts for forensic investigators trying to analyze applications that have been run on a system. Windows creates a prefetch file when an application is … Continued
This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK files? LNK files are a relatively simple but valuable artifact for the forensics investigator. Shortcut files link to an application or file commonly found on a user’s desktop or … Continued
In this episode of Mobile Unpacked, we’ll explore mobile operating system’s file and photo timestamps with special guest Brandon Epstein.
Supply chain attacks are among the most dangerous threats in modern cyber operations — not because they exploit software flaws, but because they exploit trust.
Notifications