Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Upgrade Your Video Forensics Solution to WITNESS
If you like DVR Examiner, you’re going to love Magnet WITNESS! Built with the foundation of DVR Examiner, Magnet WITNESS recovers more video evidence than ever before including video from over 50 native DVR file formats plus cloud sources like Ring or Arlo. Review and analysis just got easier too [...]
“The next generation of blockchain solutions are here to secure the world digital future.” – BlockChain Security
BlockChain Security provides applications and solutions in the fields of blockchain, evidence preservation, cyber, smartphone/mobile devices, and digital computer forensics. BlockChain Security solutions is for individuals, businesses, cyber security teams, government agencies, military and intelligence groups. Our solutions include digital data preservation, anti-counterfeiting, data and evidence hash verification, smartphone, IoT, [...]
Crypto-Triage your frontline Crypto Tracking Tool
Empower early investigation with Crypto Triage Smart AI Modeling integrated by global database. Our portable case software ensures seamless, private sharing and simplifies complex crypto transaction through quick searches of single wallet address or cases. Crypto Triage presents its Smart AI Modeling - the first triage tool as a software [...]
Magnet AXIOM Cyber 7.5 is now Available
Initiate Processing of Mobile Images From a VeraKey VeraKey is a forensic solution that enables consent-based, full file system data extractions from iOS and Android devices. The combination of AXIOM Cyber and VeraKey gets you the most evidence so you can quickly and easily work through investigations. Adding and Updating [...]
The all-in-one forensic decryption solution: Passware Kit Ultimate
Passware Kit Ultimate The tool that is is the all-purpose encryption detection and decryption solution that allows investigators to access data from computers, disks, files, and mobile devices. Passware forensic products are used by the world’s top law enforcement agencies to crack cases where decryption is required with a 70% [...]
Magnet Forensics Acquires Griffeye, a Leading Digital Media Forensics Software Firm
Magnet Forensics Inc., a developer of digital investigation solutions for more than 4,000 enterprises and public safety agencies in over 100 countries, announced today that it has acquired Griffeye, a world leader in digital media forensics for child sexual abuse investigations. Founded in 2015 and based in Gothenburg, Sweden, Griffeye [...]
JTAG, ISP, Chip-Off, and IoT Forensics – You still need these skills!
H-11 Digital Forensics has been providing certified training on JTAG, ISP, Chip-Off and Rusolut's VNR advanced data recover techniques. We invite you to join us in taking one of H-11's certified courses. JTAG, which stands for "Joint Test Action Group," is a standardized interface and protocol used [...]
Digital Intelligence’s FRED-C Workgroup Server – the right fit for your Lab
FRED-C Workgroup Server Digital Intelligence (DI) continues to lead the way for Digital Forensic Servers, Workstations, Laptops, and Mini Computers. For years DI has provided a full scalable server called the FRED-C. Now you can get a mid-size device called the FRED-C Workgroup Server. The FRED-C Workgroup Server is built [...]
VeraKey device imaging and Signed Mac Agents with Jamf in Magnet AXIOM Cyber 7.4
This release introduces a new signed Mac agent to help ensure you can quickly and reliably collect from remote Mac endpoints without triggering Apple’s Transparency, Consent, and Control (TCC) prompt. This release also adds a new viewer that lets you review protocol buffer files directly in AXIOM Cyber and the [...]
Security Marshal solutions arrest Ransomware, Malicious Code, Malware, Phishing Attacks, and provides DLP
Security Marshal is a leading provider of advanced Email Security and Cyber Solutions, dedicated to safeguarding your organization against sophisticated email attacks and cyber threats. Our global team of experts offers tailored solutions to effectively address and mitigate these evolving risks. In collaboration with Avanan, a Check Point Company, Security [...]