Comae Memory and network analysis: Beginning an incident investigation

A common scenario for SOC’s and IR teams is being handed a piece of evidence and being asked to “Find Evil.” Those on the receiving end know this to be a broad ask. If there is a known good image to compare things to, the process may be easier, but not all organizations have a gold build available for comparison.

8 Log files you can collect from iOS and Android devices

If you tuned in to the 2024 MVS presentation, “Logging La Vida Loca,” or Episode 14 of Mobile Unpacked, then you may be wondering where you can get a cheatsheet or copy of all the locations and types of logging data you can gather in your investigations. Well, look no further than this blog post!

Software kernels: Unraveling digital forensics intricacies

In this article we will cover the basics of what a software kernel is, the application of software kernels in the context of digital forensic examinations, and we’ll shed some light on how kernels contribute to the acquisition and analysis of data during a forensic investigation.

Making a case (Portable Case)

Magnet AXIOM’s Portable Case is a lightweight version of the full capabilities found in AXIOM—designed for easy access and analysis of forensic findings.