解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 5 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

ArcPoint Forensics

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Belkasoft

YouTube video

Black Hills Information Security

YouTube video

00:00 – PreShow Banter™ — Wade’s Googly Eyes00:41 – BHIS – Talkin’ Bout [infosec] News 2023-01-2301:26 – Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION! We are self-publishing free Infosec Zines called PROMPT#. PROMPT# will contain: Infosec articles Challenging puzzles Comic book based on real-life hacking adventures Coloring contests Bonus Backdoors & Breaches Consultant Cards (print version only) Other stuffs You can check out current and upcoming issues here: //www.blackhillsinfosec.co...

YouTube video

YouTube video

YouTube video

BlueMonkey 4n6

YouTube video

Breaking Badness

CactusCon

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Cisco’s Talos

Talos Takes 126: Year in Review - Threat Landscape Edition By Mitch Neff Friday, January 27, 2023 16:01 2022YiR Year In Review We're back with another year in review focused episode. This time the focus will be the threat landscape generally and I'll be joined by threat researcher Caitlin Huey. In this episode we'll discuss what we found in the last year, with a focus on the general threat landscape. We'll spend time discussing dual use tools, lolbins, and the surprising re-emergence of USB atta...

Cyber Secrets

YouTube video

YouTube video

YouTube video

YouTube video

Cybereason

Written By Malicious Life Podcast January 24, 2023 | A year ago we told you the story of Kaseya: an IT solutions company that was breached on July 2021, and its servers were used to spread ransomware to an estimated 800 to 1500 small to medium-sized businesses. Nate Nelson, our Sr. producer, spoke with Rich Murray, who leads the FBI’s North Texas Cyber unit, about how the Federal Bureau of Investigations dealt with another attack by REvil - this time against the Texas government - and how they m...

Detections by SpectreOps

YouTube video

YouTube video

Digital Forensic Survival Podcast

Gerald Auger at Simply Cyber

YouTube video

InfoSec_Bret

YouTube video

John Dwyer

YouTube video

Karsten Hahn at Malware Analysis For Hedgehogs

YouTube video

Magnet Forensics

YouTube video

Today’s enterprise digital forensics and incident response (DFIR) professionals are under enormous pressure to conduct fast and thorough investigations all while managing increasing data volumes and expanding attack surfaces. Integrating digital forensic tools with security solutions (e.g., EDR, SIEM, SOAR, etc.) using Magnet AUTOMATE Enterprise enables DFIR teams to keep up with fast-moving cyber threats by triggering a forensic response within seconds of an alert. AUTOMATE Enterprise is a digi...

Growing data volumes and a larger-than-ever remote workforce have made it difficult to enable timely and effective digital evidence review. With Magnet REVIEW, investigators and other team members can be empowered to easily and securely collaborate to quickly find the digital evidence that matters. Join Trey Amick, Director of Forensic Consultants, and Jonathan Evans, Senior Product Marketing Manager, to see how Magnet REVIEW can help you accelerate digital evidence review by enabling secure age...

In this Tips and Tricks session, we will use AXIOM Process to ingest mobile data extractions. After processing, the artifacts will be explored using AXIOM Examine. Speakers Kim Bradley Forensics Consultant Certificates After viewing this webinar, you can download a certificate of completion from the event console. View Webinar View the Webinar View Webinar Share Related Resources Feb 1 Upcoming Webinars Upcoming Webinars Optimizing your Agency’s Cyber Intrusion and Internal Investigations with A...

Mossé Cyber Security Institute

YouTube video

Neil Fox

YouTube video

Nick Berrie

YouTube video

Richard Davis at 13Cubed

YouTube video

RickCenOT

YouTube video

SANS Cyber Defense

YouTube video

YouTube video

Uriel Kosayev

YouTube video