Magnet Axiom 8.6: Magnet Copilot offline AI capabilities and more

Magnet Axiom 8.6 introduces a new offline version of the early access to Magnet Copilot’s AI capabilities, helping you easily recognize potentially relevant data in your cases and determine the authenticity of media. This new release adds enhanced related media options to Artifact Explorer, and support for four additional languages in Magnet Exhibit Builder. Axiom … Continued

Magnet Axiom Cyber 8.6: Linux support for MITRE ATT&CK framework integration, Comae memory analysis improvements, and offline access to Magnet Copilot

The latest release of Magnet Axiom Cyber introduces several improvements for examiners working on a variety of investigation types, from incident response to internal investigations.   Magnet Axiom Cyber 8.6 includes an array of new features and improvements, such as:  We’ve also updated and added to our artifact support (full details at the end of … Continued

New certification available for Magnet Griffeye users: MCGF 

When your word can make or break a case, your credibility is vital. Without a way to demonstrate your mastery of digital forensics, it can be harder to defend your findings and present them with full confidence.  With Magnet Griffeye tools being a potentially vital part of any case involving media files—particularly CSAM—it’s even more … Continued

The importance of PowerShell logs in digital forensics 

PowerShell is a powerful tool within Windows systems, widely used for administrative tasks, automation, and scripting. Unfortunately, due to its powerful scripting capabilities and default presence on Windows machines, it has also become a popular tool for malicious actors. PowerShell can be used in advanced attacks, including fileless malware, lateral movement within a network, and … Continued

5 iOS forensics evidence sources to capture before they expire

Time is always critical when dealing with criminal investigations, but did you know that some iOS forensics evidence will be lost entirely if it isn’t extracted within a certain window of opportunity? To help avoid any lost data during mobile forensic data extraction, we have outlined the best iOS evidence sources to capture before expiration, … Continued

Unraveling the clues: RDP artifacts in incident response 

Remote Desktop Protocol (RDP) is a powerful tool for remote administration, but it can also be a gateway for attackers seeking unauthorized access. For digital forensics professionals, RDP artifacts are critical in tracing an intruder’s steps.   In this blog, we will explore what RDP digital artifacts entail, where they are located, how they can be … Continued

Investigating data exfiltration: key digital artifacts across Windows, Linux, and macOS

Data exfiltration—the unauthorized transfer of data from a system—can result in severe damage to organizations, making it critical for forensic investigators to identify key digital artifacts that reveal how, when, and where the breach occurred. Tools such as Magnet Axiom Cyber, Magnet Axiom, and Magnet Nexus are essential in uncovering these critical pieces of evidence. These … Continued

Real-time hash matching against NCMEC: Now in Magnet Griffeye products 

About a year ago, we announced our partnership with the National Center for Missing and Exploited Children (NCMEC)—the largest and most influential child protection organization in the U.S. Over the past year, we have collaborated to build a new information-sharing solution to support ICAC investigators across the U.S.  Today, we’re excited to launch the NCMEC … Continued