What can we help you find?

Looking for something specific?

  • Blog
  • Blogs
  • Case Studies
  • Events
  • How-Tos
  • Podcasts
  • Videos
  • Webinars
  • White Papers


See all upcoming and on-demand webinars

Most Recent Blog Posts

Published on January 27, 2020

Using Magnet AXIOM Cyber to Fight Workplace Fraud

Fraud in the workplace is top-of-mind for many corporate investigators. In fact when we polled our own client base in October of 2019 as to what kind of corporate investigations they are most often seeing, Fraud rose to the top of the list with 54% of respondents saying that they Always or Often are dealing with cases of Fraud. And rightfully so, according to the Association of Certified Fraud Examiners 2018 Report to the Nations: Global Study on Occupational Fraud and Abuse, over the past 10 years fraud has doubled and will continue to rise with the advancement of technology. With more and more organizations transitioning their storage and services to the cloud, that presents yet another advancement that not all may be ready for when it comes to being able to perform effective and comprehensive examinations. Looking at some other statistics from the ACFE’s 2018 Report, they also paint a very real picture as to how serious of a threat fraud is: Globally workplace fraud costs organization over $7 billion per yearOrganizations can lose an average of 5% of its revenue to fraudCreation and alteration of fraudulent electronic documents are some of the most common concealment methods used by bad actors1 in 5 organizations lose more than $1 million a year to fraud https://www.youtube.com/watch?v=gurHvkKi2Xw As technology advances to victimize organizations, so too must technology advance to protect and safeguard organizations. Magnet AXIOM Cyber is a modern digital forensics platform tailored to meet the needs of today’s companies that have…

About a 2 minute view

January 27, 2020 • About a 2 minute view

Published on January 27, 2020

How Magnet AXIOM Cyber Can Be a Critical Tool in Your Incident Response Investigations

Incident Response is an important process within your organization that helps safeguard your IP, client and employee records, and ultimately the livelihood of your employees. Many companies today, large or small, are facing cyber attacks constantly. With the proliferation of technology and likewise the increased reliance of cloud services and storage, cyber attacks are increasing in size, complexity, and cost to the victim organization. In 2019, the average cost of a data breach was $3.92 million dollars; and according to IBM’s 2019 Cost of a Data Breach report, an average of +25,000 records are compromised at a cost of $150 each. Unfortunately it’s not necessarily a question of if a data breach will occur, but more appropriately: when. https://www.youtube.com/watch?v=N631faEKWOg A critical step of the IR process is the Analysis stage. This stage is key to understanding exactly what happened and how so that your learnings can be used to harden your processes and network as well as being used to potentially recover stolen data or money. Magnet AXIOM Cyber enables forensic examiners to quickly and easily perform IR investigations such as malware or ransomware, APT cases, phishing, BEC scams, to name a few. Watch this video to see our Forensic Consultant, Tarah Melton, give you an idea about how to use AXIOM Cyber for your IR investigations. https://www.youtube.com/watch?v=sDw18h03xI8 “Magnet helped me quickly identify a ransomware attack and find patient-zero with the Timeline feature!” —John Wyatt, Digital Forensic Investigator Large Enterprise Telecommunications Company Here are some other useful ways that our…

About a 2 minute view

January 27, 2020 • About a 2 minute view

Published on January 27, 2020

Investigating Intellectual Property Theft with Magnet AXIOM Cyber

Intellectual Property is likely the most valuable asset that your company owns. And it can often the target of cyber attacks from external sources like hackers, as well as from insider threats too. Insiders like employees, contractors, or other third parties with access to privileged information present a very real threat to your IP because it’s so easily available. https://www.youtube.com/watch?v=IrhWASaMZD0 “It Can Be Very Difficult to Distinguish Illicit Access from Legitimate Access” The CERT Guide to Insider Threats states that: “Insiders steal information for which they already have authorized access, and usually steal it at work during normal business hours. In fact, they steal the same information that they access in the course of their normal job. Therefore, it can be very difficult to distinguish illicit access from legitimate access.” And it’s everywhere from emails, to Office 365 docs, cloud storage, employee workstations, and mobile devices. Keeping the proper checks and balances in place is difficult if not impossible since IP Theft is most often committed by those who have access to it (or even have helped create it). When investigating cases of IP Theft, it’s imperative to understand at a granular level how files are moving between different locations, how they are being altered, what programs or apps are being used to access them and by whom. It’s equally important to analyze all of this evidence in one case file. How Magnet AXIOM Cyber Can Help Investigate IP Theft Magnet AXIOM Cyber helps investigators unite images from multiple evidentiary…

About a 3 minute view

January 27, 2020 • About a 3 minute view

Published on January 27, 2020

Employee Misconduct Investigations — Get the Whole Story with Magnet AXIOM Cyber

Employee Misconduct cases, usually initiated by HR or from managers, can be wide ranging. From harassment, to misuse of corporate assets, to visiting prohibited websites while at work, Employee Misconduct has a very real toll on organizations. With harassment alone, 70% of people who are bullied or harassed in the workplace end up leaving their employer. This employee turnover can result in significant costs such as retraining, lost productivity, and even potential Wrongful Termination lawsuits—not to mention intangible costs such as the impacts on company culture, workplace morale, and brand reputation. https://www.youtube.com/watch?v=SAfnFDQqzGE How AXIOM Cyber Can Help In these cases, swift action is needed to investigate allegations and reports from internal stakeholders so that the appropriate action can be taken. Magnet AXIOM Cyber gives investigators the tools to quickly find the evidence that they’re looking for wherever it may be. Whether it’s a Slack conversation, communication via social media or mobile devices, or files that are buried and obfuscated on someone’s hard drive, AXIOM Cyber can help find the evidence needed to drive a decision made by HR or another stakeholder. Watch this video from our Forensic Consultant, Trey Amick, to see how you can use AXIOM Cyber for Employee Misconduct investigations. https://www.youtube.com/watch?v=8hoLpT5pMjM “I used Magnet to find artifacts and evidence from Chrome history along with Timeline to prove that a user misused company asset for sexual harassment and then to access and store inappropriate contents. It easily showed me where the content came from, what was used to open…

About a 2 minute view

January 27, 2020 • About a 2 minute view

Published on January 24, 2020

AirDrop Artifacts and More in Magnet AXIOM 3.9!

Magnet AXIOM 3.9 is now available! Update within AXIOM or download AXIOM 3.9 over at the Customer Portal today. In addition to performance and quality of life improvements, AXIOM 3.9 includes updated AirDrop artifacts, rebuilt desktops for Windows, and more. If you haven’t tried AXIOM yet, request a free 30-day trial here. Mac Support in AXIOM Continues with More AirDrop Artifacts With the recent releases of both AXIOM 3.8 and 3.9, we’ve added additional Mac support to parse the unified log for entries surrounding the use of AirDrop. You can review these AirDrop artifacts on both computer and mobile evidence sources. Whether your macOS/iOS case is based on intellectual property theft from an organization and identifying how that data was exfilled, or a criminal investigation tracking contraband on devices, AirDrop should be investigated as a potential source of how that data was moved. Go in-depth on what you can get from the AirDrop in this how-to document. https://www.youtube.com/watch?v=is61d4aQeX8 Rebuilt Desktop Rebuilt Desktops is a new artifact that allows users to view an approximation of what a given Windows user's desktop looks like, including wallpapers, monitor configurations, and icon positioning—without having to virtualize the image. Many examiners, as part of their court preparation, will virtualize images in an effort to show non-technical stakeholders the look and feel of someone’s Windows environment. While this is powerful when it comes to painting a clear picture of possible intent of a suspect, virtualizing an image often requires additional software and time. The Rebuilt Desktops…

About a 2 minute view

January 24, 2020 • About a 2 minute view

See all blog posts

Most Recent Videos

See all videos

Featured Content

See all featured content

Free Tools

We’re proud to offer a selection of free tools for download. Below are 4 of our popular free tool resources to get you started. Find the full list here.


Quickly and easily acquire forensic images of any iOS or Android device, hard drive, and removable media.


The perfect digital forensic tool for capturing how web pages look at a specific point in time.


Capture the physical memory of a suspect’s computer and recover and analyze valuable artifacts.


Create custom artifacts for use within Magnet AXIOM from CSV and SQLite databases.

Explore Our Products

The Complete Digital Investigation Platform
Simplify your remote forensic investigations
Finish investigations faster by automating your workflow
Organize cases and maintain the chain of custody
Let Non-Technical Users Analyze Digital Evidence.
Quickly and easily preview devices for CSAM and illicit apps

Start modernizing your digital investigations today.

Ready to explore on your own? Start a Free Trial