When Windows takes a nap and leaves you evidence: Inside hiberfil.sys
Hiberfil.sys is one of those Windows artifacts every examiner should know about. It can contain a near-complete capture of system memory but is also tricky to collect and parse.
Hiberfil.sys is one of those Windows artifacts every examiner should know about. It can contain a near-complete capture of system memory but is also tricky to collect and parse.
Mobile apps are central to how users interact with their devices—and they leave behind a rich trail of forensic evidence. In this episode of Mobile Unpacked, we’ll explore the full lifecycle of an app: how it gets installed, how to trace its origin, monitor its usage, and uncover what remains even after it’s been deleted. Whether you’re investigating user behavior or uncovering hidden data, understanding app artifacts is key to unlocking mobile evidence.
Not all products are available in all regions and may be restricted to specific customer types
Mobile devices store data in fragmented and often unintuitive ways.
We’re excited to announce the launch of Magnet Certification Preparation —a new series of reinforcement training designed to help qualified students confidently prepare for their certification exams.
Violent crime continues to be a serious problem in many major metropolitan areas, often fueled by the complex and intertwined networks of drug trafficking and gang activity. Some 33,000 violent gangs are active in the U.S., engaged in a variety of illegal activities, including robbery, drug and gun trafficking, prostitution, human trafficking, racketeering, and fraud. … Continued
In this joint webinar, Technical Forensic Specialist Kate Woolley and a seasoned investigator Randy Gohn from Concordia Parish Sheriff’s Office will showcase the power of Magnet Witness in recovering and analyzing video evidence from DVR systems—especially in challenging scenarios like arson investigations.
Digital Forensics and Incident Response (DFIR) has evolved rapidly from purely reactive investigations to incorporating proactive approaches that utilize cloud-powered forensics and AI. But while the tools and techniques may have advanced, so too have the complexities: hybrid and remote workforces, supply chain compromises, expanding attack surfaces, and the increasing pressure to collect evidence before it disappears.
In this special episode of Cyber Unpacked, hosts Doug Metz, Senior Security Forensics Specialist, and Jeff Rutherford, Forensic Consultant, bring together a panel of DFIR leaders to explore the state of digital investigations today. We’ll unpack some of the top challenges investigative teams face, from AI’s opportunities and risks to common pitfalls they’ve overcome. They’ll also share how different organizations are adapting, why celebrating internal wins matters, and what trends DFIR leaders should be paying attention to next.
Join us for what’s sure to be a lively discussion on where DFIR is headed, and how you can equip your team to respond with speed, accuracy, and confidence in an ever-evolving technological landscape.
Managing the vast amounts of data generated in today’s investigations has become a major challenge for digital forensics labs. Not only do you need to acquire, process, and analyze the ever-growing volumes of digital evidence coming into your lab, but you must also find a way to securely and reliably manage it throughout your entire investigative lifecycle – any lapse in data availability, integrity, or chain of custody can compromise your entire investigation and derail a prosecution.
As we reach the mid-point of the Magnet Axiom and Magnet Axiom Cyber 9 series, we have continued to build their capabilities, with new and updated features that help you work more efficiently. Some feature highlights from the last three releases include: To keep your cases current with the latest apps and services, we also … Continued
In this first episode of Legal Unpacked, Magnet Forensics’ resident prosecutorial expert, Justin Fitzsimmons will provide investigators and prosecutors with a practical, structured approach to drafting search warrants for digital evidence.