Blog Post

Risk Diversion and AXIOM in the Fight Against Cybercrime

Vernon Fryer • Mar 20, 2024

Discovering the Trust in Cybercrime Investigations

Cybersecurity has gone worldwide in the modern era, and large-scale, complicated cyberattacks are becoming increasingly common. Computer forensics assists in maintaining the integrity of digital evidence used in civil and criminal court proceedings. To combat cybercrime, Risk Diversion has created scientifically solid suggestions and proposals for the use of instruments for forensic investigation of computer tools and systems. Various forms of computer forensics have been recognized by Risk Diversion, including database forensics, electronic forensics, malware forensics, criminology of memory, mobile forensics, and network forensics. Already, cybercrime has developed into a very profitable industry that carries no risk. After all, cybercrime can bring in millions of dollars in revenue. For this reason, cybercrime ranks highest nowadays.


Responding to need to fight cybercrime Risk Diversion has formulated a robust digital forensics solution tailored to meet the needs of businesses and service providers that need to collect, analyze, and report on evidence from computers, cloud services, IoT, and mobile devices. Our tailored solutions are aligned with requirements of Section 26 of the Cyber Crimes Act.


Cloud storage and communication services have changed the way that teams communicate, share, and store information. Leverage admin or user credentials to access audit logs and examine employee cloud accounts without tipping them off about an ongoing investigation. AXIOM Cyber acquires and analyses data from corporate cloud storage services like AWS S3, EC2, and Azure in addition to other cloud sources including Microsoft 365, Google Workspace, Box, Dropbox, Slack, and iCloud.


The AXIOM solution provides the most comprehensive and powerful recovery, search, analysis, and reporting tools for Macs, PCs and Linux. Get actionable insights into activity and executables on the physical memory of an endpoint as well as the processes running only in memory - like advanced persistent threats (APTs) that leverage fileless techniques.


Whether a mobile device is BYOD or corporate-issued, AXIOM is an essential part of your toolkit for iOS and Android investigations. Comprehensive parsing and carving techniques find more artifacts like browser history, chats, emails, and documents. Easily visualize and present evidence by showing emails and chats in their original format that are often needed for HR internal investigations like employee misconduct or harassment cases.


Organizations of all sizes fall victim to cybersecurity threats every day. With an artifacts-first approach and built-in remote forensic acquisition, Risk Diversion helps you quickly understand security incidents so you can safeguard your agency in the future.


AXIOM Cyber enables you to perform remote collections of Mac, Windows, and Linux devices quickly and covertly to an AFF4-L forensically sound container. Automatically reconnect to the target if it goes offline and resume collections from where it left off. Using shared agents, multiple instances of AXIOM Cyber can collect from an endpoint without the need to deploy a different agent each time.


The artifacts-first approach immediately presents the data you need to work through your case with ease and efficiency. Get data from a variety of sources, including computers, mobile devices, and corporate cloud accounts. Then, utilize powerful Analytics features like Timeline, Connections, YARA rules and Magnet.AI to save valuable time and hassle.


Put together all the pieces of the puzzle by examining artifacts from the file system, cloud accounts, mobile devices, and memory when it comes to claims of workplace harassment, fraud, or misuse of corporate assets.


Accelerate and simplify early case assessment by giving eDiscovery partners the data that they need. Produce a load file containing data that has been culled, analyzed, and tagged for further review.


When it comes to data exfiltration cases, it’s critical to see the whole history of a file. Understand a file’s history across all evidentiary sources including Microsoft 365, Google Workspace, and AWS cloud storage.


Network intrusions, business email compromise, malware, and ransomware attacks can have catastrophic effects. AXIOM powerful toolset lets you understand how an incident occurred so you can prevent it in the future.


Increase the speed and efficiency of investigations by integrating your toolkit into streamlined automated workflows. Keep your lab running 24/7/365, even when you aren’t there. Fully utilize your existing resources to automatically image, process, and create exports for multiple data sources in parallel. Do more with the resources you have. Let examiners focus on high-value tasks like deep dive analysis and let technology handle the rest.

Because time-to-evidence is now guaranteed inside 48 hours, investigators can identify and act on relevant material quickly.


The investigator can now use the drag-and-drop workflow builder which makes it easy to develop efficient, automated workflows across your entire forensic toolkit, customized for each case type. Automatically collect from remote endpoints and select cloud sources (Microsoft Office 365, OneDrive, SharePoint, and Teams.)


Seamlessly integrate almost any tool from your toolkit, including forensic solutions, cybersecurity (XDR/EDR, SIEM, SOAR), mobile acquisition tools such as Magnet GRAYKEY or MAGNET VERAKEY, and business systems tools. Connect your tools via several methods, such as REST API, custom scripts, Watch Folders, and Workflow Plugins. For increased flexibility, you can also integrate your custom scripts.


Clear, visual dashboards help you quickly assess lab infrastructure health and provide key insights for smarter resourcing decisions. Easily report to management on the value of your lab investments by tracking overall throughput and efficiency metrics.


Easily adhere to standard processes by empowering your experts to design approved workflows for each case type. Forensic technicians or junior members of the team can then kick off the right workflow from a dropdown menu while experts focus their time on analysis.


Risk Diversion Blog

By Vernon Fryer 13 May, 2024
Exploring the complex and fascinating world of Speech Analysis
By Vernon Fryer 06 May, 2024
Digital Forensics in Aircrafts
By Vernon Fryer 29 Apr, 2024
The superhighways and byways of cyber space has enabled millions of IoT devices to be connected to the internet.
By Vernon Fryer 05 Apr, 2024
Video and photo enhancement software
By Vernon Fryer 27 Mar, 2024
Big changes are coming with new phones in 2024
By Vernon Fryer 13 Mar, 2024
Delving into the Newest Features of XRY
By Vernon Fryer 04 Mar, 2024
Exploring the Rapidly Evolving World of IoT Forensics in Motor Vehicles
By Vernon Fryer 21 Feb, 2024
Exploring the capabilities of Risk Diversion’s Vehicle Forensics Game Changing Software
By Chantel Van Niekerk 16 Apr, 2020
As the South African government has announced the extended lockdown to curtail the spread of the Corona virus (COVID-19), we would like to encourage everyone to adhere to the restrictions and guidelines set out to make our country safe. From our side, we have set-up operations so that our employees can work remotely to comply with guidelines of social distancing. During this period of off-site operations, we are confident that we will continue to provide excellent service and support that has been the hallmark of our company. While everyone is working from home that comes with a host of new challenges. It does not have to be all doom and gloom, we believe that as a society we will come out stronger after this. We would like to use this time to re-establish connections with you our clients and partners to allow us to gauge what you want from us and that you are being serviced correctly as it pertains to your forensic needs. Our products range from remapping hard drives, retrieving data from cell phones and computers, CCTV footage retrieval and much more. Feel free to contact us at delton@riskdiversion.co.za to set up an online meeting. We would like to hear what new challenges you are faced with during this time and feel confident that we can provide a solution for you.
Your child and cyberbullying
By Risk Diversion 06 Feb, 2020
Cyberbullying is fast becoming a bigger problem for young adults than drug abuse, with 20% of teenagers victimised and 51% of adolescents saying it is more vicious than face-to-face bullying.
More Posts
Share by: