How to Ingest Mobile Extractions from GrayKey, UFED, XRY, and Oxygen in Magnet AXIOM
In this series, we walk through how to ingest images from a variety of third party sources into Magnet AXIOM.
In this series, we walk through how to ingest images from a variety of third party sources into Magnet AXIOM.
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.
Here are a few mobile device forensics dos and don’ts that can help you and your agency ensure you are following best practices.
In this blog, we will provide best practices for examining mobile consent devices, so you are well equipped to process it.
As examiners, we often find ourselves wanting to know if a program was executed on a system, when it was executed on a system, or if a program or file ever existed on a system.
Magnet AXIOM 6.4 is now available, offering you faster Timeline filtering than ever before, so you can reduce the time it takes to establish the timeline of events for your case.
Learn about the essential components needed to process mobile devices and solve cases more efficiently.
We are thrilled to announce the release of AXIOM Cyber 6.4. This release adds more filtering capabilities and evidence sources to Email Explorer, as well as performance improvements to key AXIOM Cyber features to help you work through your cases efficiently.
Maintaining up-to-date hash sets can be a painful process, especially for those operating in offline labs. Hash Sets Manager (currently in beta) lets you easily manage a central database of hash sets that you can distribute to your team’s instances of Magnet AXIOM and AXIOM Cyber, even if they are operating offline.
Digital Forensics and Incident Response (DFIR), is often used to speak about both the digital forensics and incident response fields—related but separate areas. Let’s delve into what both digital forensics and incident response are and why they are often grouped together.