What’s New in Magnet AXIOM Cyber 5.10
We’re happy to announce the availability of Magnet AXIOM Cyber 5.10! You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal.
We’re happy to announce the availability of Magnet AXIOM Cyber 5.10! You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal.
Stephen Boyce, who served agencies of the U.S. State Department as well as the FBI, on the Magnet Digital Investigation Suite.
In the United States, 62% of Insider Threats are data exfiltration. This is, by far, the most common type of Insider Threat, with three times more frequency than the second most common Insider Threat: privileged misuse. Data exfiltration or IP theft, is simply when data walks out the door of your business. These types of … Continued
While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued
Learn how to conduct an eDiscovery digital forensic investigation in 4 steps, with real examples from the DFIR experts at Magnet Forensics.
Delve into a data breach investigation with a step-by-step walkthrough of what you may expect and how to perform your examination.
We’re following a realistic, yet hypothetical ransomware investigation picking up where the forensics lab would begin and end its work.
In this blog, we will provide some background information, resources, and tools to help you prepare for Chromebook investigations.
In this post, we’ll take a look at some of the benefits for your lab specifically that are gained when your lab is virtualized.