What Is ICAC And How Does It Work?

For those unfamiliar, according to icactaskforce.org, the Internet Crimes Against Children (ICAC) Task Force Program “is a national network of 61 coordinated task forces, representing more than 5,400 federal, state, and local law enforcement dedicated to investigating, prosecuting, and developing effective responses to internet crimes against children.”

Meet the Magnet Forensics’ Training Team: Katie Bressington

Introducing our newest member of the Training Team, Katie Bressington! Katie joins us from a background in Law Enforcement and Digital Forensics. Let’s get to know Katie! Want to learn more about what courses are offered? Visit our Training & Certification page for more information. MF: Tell us about your life before becoming a Trainer. … Continued

Anatomy of a Data Exfiltration Investigation

In the United States, 62% of Insider Threats are data exfiltration. This is, by far, the most common type of Insider Threat, with three times more frequency than the second most common Insider Threat: privileged misuse.  Data exfiltration or IP theft, is simply when data walks out the door of your business. These types of … Continued

Anatomy of a Business Email Compromise Investigation

While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued