Resource Center


Investigating and Containing Cyber Attacks with OSINT and AXIOM

Join Jordan Hunt from Hunt DFIR to explore a cyber-attack incident response case study. Jordan will walk through the end to end process from identification and collection of known Indicators of Compromise (IOC) using Open Source Intelligence (OSINT) and use these in AXIOM to find the threat then locate additional IOCs that are unique to the clients’ attack and environment to ensure full containment and appropriate eradication.

View the Webinar

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.