Investigating a Ransomware Attack Using Magnet AXIOM Cyber
Ransomware attacks are being experienced by corporations large and small. Here’s how you can use AXIOM Cyber to investigate an attack.
Ransomware attacks are being experienced by corporations large and small. Here’s how you can use AXIOM Cyber to investigate an attack.
The latest version of Magnet AXIOM Cyber, 5.3, is now available! You can upgrade to AXIOM Cyber 5.3 in-product or over at the Customer Portal. If the investigations that you’re working are email-heavy, this is the update for you! An update that we made to the way we handle EML(X) files will save a considerable amount of time for examiners who … Continued
With AXIOM Cyber 5. 2, we’ve introduced new features and released new beta functionality, called Project Prague™.
AXIOM Cyber enables remote investigations by adding index searching and filtering capabilities to remote system previews.
Collecting data from Instagram via the Cloud directly in Magnet AXIOM and Magnet AXIOM Cyber can provide investigators with the most recent posts associated with a hashtag or user activity within public facing information. Acquiring data via the Cloud Module is particularly valuable because the information is collected immediately, whereas warrant returns, for example, provide … Continued
With AXIOM Cyber 5.1, you can acquire from as many data sources as possible including social media, email attachments, Chromebooks, and more.
CUPS often logs information into the system that can provide valuable data on what was printed, by who, and to what printer.
Learn how to acquire, process, and examine public Facebook activity data, including a user’s friends list and posts.
We have a slew of new things in AXIOM Cyber which will make your investigations faster, more efficient, and stronger than previous versions of AXIOM Cyber.
You can leverage your Microsoft Azure cloud environment to host Magnet AXIOM Cyber and realize the benefits offered by an IaaS environment.
Notifications