• Training
  • Support
  • English
  • Products
    • Public safety
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Federal agencies
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Military & intelligence
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Enterprise
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
    • Service providers
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
  • Resources
    • All resources
          • All Resources

            Check out the latest resources and thought leadership for all resources.

            Explore All Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
    • Resources By Industry

    • Enterprise
          • Enterprise Resources

            Check out the latest resources and thought leadership for enterprises and corporate digital investigations.

            Explore All Enterprise Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
    • Public safety
          • Public Safety Resources

            Check out the latest resources and thought leadership for public safety.

            Explore All Public Safety Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
    • Service providers
          • Service Providers Resources

            Check out the latest resources and thought leadership for forensic service providers.

            Explore All Service Provider Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
    • Federal agencies
          • Federal Agencies Resources

            Check out the latest resources and thought leadership for federal agencies and government.

            Explore All Federal Agencies Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
    • Military & intelligence
          • Military & Intelligence Resources

            Check out the latest resources and thought leadership for military, defense, and intelligence.

            Explore All Military & Intelligence Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
  • Our community
    • Magnet Idea Lab
    • Officer wellness
    • Scholarship program
    • Agency Impact Award
    • The Auxtera Project
  • Partners
    • Why partner with Magnet Forensics?
    • Strategic partners
    • Channel partners
    • Training partners
  • Company
    • Our team
    • Careers
    • Press
  • Training
  • Support
    • English
  • English

Topic: Cybersecurity

Could Digital Forensics be the Secret Weapon for Your Cybersecurity?

July 27, 2023

By Phil Froklage

Digital forensics has become an indispensable part of cybersecurity programs. That’s largely driven by the harsh reality that falling victim to a security event isn’t a matter of if, but of when.

TrueBot Malware: What It Is and How to Hunt It

July 10, 2023

By Phil Froklage

TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.

How to Investigate Infostealer Malware 

June 28, 2023

By Phil Froklage

If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared.

CL0P: Hunting a New Kind of Ransomware

June 22, 2023

By Phil Froklage

The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.

The Growing Importance of Digital Forensics and Incident Response (DFIR) in Corporate Environments

June 8, 2023

By Phil Froklage

With the complexity and frequency of cyber threats targeting businesses growing at alarming rates, digital forensics and incident response (DFIR) has become an indispensable component of cybersecurity programs. DFIR teams in corporate environments are increasingly called on to unravel complex threats and uncover critical insights into incident response investigations, including ransomware attacks, data exfiltration, and … Continued

Best Practices for Ransomware and Data Extortion Memory Response

May 30, 2023

By Phil Froklage

The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a “#StopRansomware Guide” Cybersecurity Information Sheet (CSI) which aims at providing guidance to organizations to reduce the impact of ransomware incidents and a checklist of best practices for responding to these threats.

Hunting Russian Intelligence “Snake” Malware in Memory With Magnet AXIOM Cyber

May 12, 2023

By Phil Froklage

This week, a joint cybersecurity advisory was issued by the cybersecurity authorities (AA22-110A) of the United States, Canada, Australia, New Zealand and United Kingdom to provide an overview of Russian state-sponsored cyber operations and TTPs.

What is Infostealer Malware?

April 19, 2023

By Phil Froklage

Infostealers are a type of malware specifically designed to locate and exfiltrate credentials. Their prevalence and impact were limited pre-COVID-19 as most of the headlines were grabbed by ransomware operations that crippled large organizations.

Comae memory analysis in Magnet Axiom and Axiom Cyber

April 18, 2023

By Rick Andrade

We have added a new option for analyzing Microsoft crash dumps in Axiom Cyber with the integration of Comae memory analysis technology.

Using Magnet Axiom Cyber to unravel complex business email compromise attacks 

March 9, 2023

By Phil Froklage

Many companies have experienced a drastic increase in business email compromise (BEC) attacks, surpassing ransomware as the most prevalent cybersecurity concern. And BEC attacks have grown exponentially more complex, with multiple layers of deception requiring modern DFIR solutions to unravel these complex threats.  Using Axiom Cyber, Breadcrumb Cybersecurity have been able to accelerate the rate … Continued

Posts navigation

Older posts
Newer posts
We use cookies on our website.

To learn more about cookies, which ones we use on our site, and how to change your cookie settings, please view our Privacy Policy*. By continuing to use this site without changing your settings, you consent to our use of cookies in accordance with the Privacy Policy.*

View Privacy Policy Accept
Magnet Forensics Logo
Products
  • Magnet One
  • Magnet Axiom
  • Magnet Axiom Cyber
  • Magnet Graykey
  • Magnet Graykey Fastrak
  • Magnet Nexus
  • Magnet Verakey
  • Magnet Verakey Fastrak
  • Magnet Witness
  • Magnet Automate
  • Magnet Review
  • Magnet Outrider
  • Magnet Griffeye
  • Magnet Griffeye Operations
  • Magnet Griffeye Enterprise
  • Magnet Verify
Partners
  • Strategic partners
  • Channel partners
  • Training partners
Community
  • The Auxtera Project
  • Magnet Forensics Scholarship Program
  • Agency Impact Award
  • Merchandise store
Company
  • Careers
  • Our team
  • Magnet Idea Lab
  • Press
Resources
  • Resource center
  • Events
  • Blog
  • Free tools
  • Artifact exchange
  • Officer wellness
  • Customer stories
  • Grants for law enforcement
Support
  • Customer portal
  • Contact us
  • Subscribe to our emails
Training
  • Training overview
  • Courses and certifications
1 (844) 638-7884 sales@magnetforensics.com
  • Accessibility
  • Legal
  • Cookie Policy
  • Export approach
  • Trust & Security
  • Privacy Policy
  • California Collection Notice
  • Terms of Use
  • Email Preferences

Copyright© 2025 Magnet Forensics

Start modernizing your digital investigations today.

Complete the company & contact information form below and sales will be in touch with you shortly.

Notifications