S2:E3 // When updates turn rogue: The forensic trail of a supply chain attack
Supply chain attacks are among the most dangerous threats in modern cyber operations — not because they exploit software flaws, but because they exploit trust.
Supply chain attacks are among the most dangerous threats in modern cyber operations — not because they exploit software flaws, but because they exploit trust.
Join us for a webinar introducing Magnet Verify—a patented technology designed for reliable media authentication. In this session, you’ll learn how Verify can be used to authenticate images and videos, detect manipulations and deepfakes, and trace media provenance for courtroom-admissible evidence.
Discover how Magnet Verify, unlike any other solution, uncovers critical insights beyond standard metadata, with deterministic results that empowers efficient analysis, and supports legal proceedings with unparalleled reliability.
AI can be a game changer in creating investigative efficiencies and the analysis of large quantities of media evidence. In this episode of AI Unpacked, representatives from Brian Herrick from Thorn and Martina Tschapka of T3K will join Brandon to explore the future of AI in analyzing images and videos to identify pertinent investigative leads. Learn about the latest capabilities in CSAM and object detection as well as what to expect in the future.
In this episode of Mobile Unpacked, we’re joined by special guest Jeff Rutherford, Forensic Consultant at Magnet Forensics, for a deep dive into location data on iOS and Android. We’ll explore its unique quirks, discuss which sources you can trust, and highlight the ones you should treat with caution. Join us to learn more about one of the most crucial and highly protected types of data on modern mobile devices, and discover how understanding it can strengthen your investigations.
HaystackID supports organizations of all sizes, including Fortune 100 clients, with fast, high-stakes digital investigations around the world. In this case study, Chief Information Security Officer John Wilson and VP of Forensics Rene Novoa share how Magnet Forensics helps their team stay ahead of evolving technology in mobile investigations, meet urgent deadlines, and deliver white-glove … Continued
Acompáñenos en otro webinar de Magnet Forensics, donde revisaremos las nuevas características que se han añadido en esta última versión de Axiom, como lo son
Effective, fast, and precise incident response is a team effort.
I’ve spent my career in digital forensics wrestling with two deceptively simple questions: Where do I start and where do I stop, in an investigation? Both decisions feel like drawing lines on quicksand. You’re flooded with artifacts—timestamps, logs, messages—tempting you to search every byte. But legal deadlines and investigative demands force focus. The real skill isn’t just finding evidence but knowing when to stop.
The right evidence uncovered at the right time can make or break a case. But investigating, interpreting, and acting on that evidence quickly has become increasingly dependent on how well investigative teams work together.
The intersection of eDiscovery and digital forensics is increasingly vital to modern legal investigations. As business data spreads across the cloud, numerous endpoints, and remote work environments, legal teams must not only identify relevant evidence but also prove its authenticity, preserve its integrity, and prepare it for court.