About Jon Hansen

This author has not yet filled in any details.
So far Jon Hansen has created 249 blog entries.

Unmasking the AI: Magnet Copilot’s New Frontier in Digital Forensics

2024-06-05T17:01:18-06:00April 9th, 2024|Tags: , , , , , , , , , , , |

In the evolving landscape of digital forensics, the introduction of AI capabilities to Magnet Axiom, Axiom Cyber, and Automate, marks a significant milestone. Magnet Copilot is at the forefront of this advancement, seamlessly integrating AI functionality to bolster digital and [...]

X-Ways Forensics v21.1

2024-07-12T17:08:00-06:00April 8th, 2024|Tags: , , , , , , , , , , , |

What's new in X-Ways Forensics v21.1 Volume Snapshot and File System Support Better support for very large volume snapshots. More than 500 million items (i.e. files+directories) in a single volume are now possible, only in the 64-bit edition, subject to [...]

Rusolut VNR 8.1 Update with solution database viewer and voltage controls

2025-01-20T18:30:07-07:00March 26th, 2024|Tags: , , , , , |

Rusolut has released Visual NAND Reconstructor (VNR) 8.1, introducing several key enhancements to streamline data recovery and digital forensics: 1. Enhanced Block Manager - The Block Manager has been significantly improved, consolidating functionalities from the previous Markers Table. This enhancement [...]

What did you learn? Password Spraying and Cyber Forensics

2024-05-30T16:19:37-06:00March 12th, 2024|Tags: , , , , , , , , , , , , , |

Years ago while learning how to be a young married couple about to have a child we attended dinner with a friend and her family. During our time together one of their children fell and hurt himself, not seriously, however, [...]

Microsoft reposts an update to how to protect your servers from Password Spraying

2024-03-14T13:19:41-06:00March 8th, 2024|Tags: , , , , , , , , , , , |

Continuous learning. The need for peer review, collaborative sharing, and developing strategies for digital security. Microsoft provided information about Password Spray Attack Detection in April 2023. It is a good article, read more here. There are some other listed Blog [...]

Mastering Advanced Data Recovery Techniques with H-11 Digital Forensics Training

2024-06-18T10:53:22-06:00February 21st, 2024|Tags: , , , , , , , , , , , , , |

      In the realm of digital forensics, especially concerning smart devices, various techniques are employed to extract data from devices that are locked, damaged, or otherwise inaccessible through standard means. Techniques like JTAG, ISP, EDL, and Chip-Off are [...]

Remote data extraction from iOS

2024-06-07T18:14:56-06:00February 12th, 2024|Tags: , , , , , , , , , , , |

Oxygen Remote Explorer - This tool will find critical digital evidence quickly and completely, using targeted, remote and onsite data collection, task scheduling for automatic collection, and powerful search and analytic tools. Remotely extract iOS data with the tools and [...]

Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard

2024-03-14T13:08:08-06:00January 19th, 2024|Tags: , , , , , , , , , , , |

Human error - or perhaps just a friendly reminder that we all need continuous learning and peer review.   The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response [...]

Go to Top