Magnet AXIOM Cyber 6.0: YARA Rules, Queued Collections, Dark Mode, and More!
There is a lot to be excited about in AXIOM Cyber 6.0! Learn more about this significant update and wee what the top 6 new features are.
There is a lot to be excited about in AXIOM Cyber 6.0! Learn more about this significant update and wee what the top 6 new features are.
work environments. This means that every instance of communication must be validated upon request, and then routed accordingly.
We’re happy to announce the availability of Magnet AXIOM Cyber 5.10! You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal.
We’re happy to announce the availability of Magnet AXIOM Cyber 5.9! You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal.
Organizations often have multiple examiners assigned to individual investigations. Previously with AXIOM Cyber’s ad hoc agent deployment, one examiner could not connect to an agent already deployed to an endpoint under investigation, if they did not originally create the agent. With the latest update, AXIOM Cyber no longer restricts agent visibility to the unique user … Continued
In the United States, 62% of Insider Threats are data exfiltration. This is, by far, the most common type of Insider Threat, with three times more frequency than the second most common Insider Threat: privileged misuse. Data exfiltration or IP theft, is simply when data walks out the door of your business. These types of … Continued
AXIOM Cyber 5.8 introduces Linux remote acquisition and automated recovery of BitLocker Recovery IDs for decryption of BitLocker Images.
Learn more about how Magnet AXIOM Cyber supports the remote collection of data from Linux operating systems.
While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued
Learn how to conduct an eDiscovery digital forensic investigation in 4 steps, with real examples from the DFIR experts at Magnet Forensics.
Notifications