本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
ArcPoint Forensics
YouTube video
YouTube video
Black Hills Information Security
YouTube video
YouTube video
YouTube video
Hal Denton // Have you ever been given an encrypted hard drive to perform forensic analysis on? What could go wrong? Probably the first thought rolling through your mind is wondering if the decryption key was included with the drive. If so, you are spot on in questioning that, as the analysis would be pretty much undoable without the decryption key. What if you have the decryption key but your forensic software doesn’t prompt you for the challenge/response to decrypt the drive? What do you do ne...
moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results. Nessus Plugin ID 59642 I had mentioned in passing that I was working on learning more about remote procedure calls, and Dale invited me to take a look at this vulnerability with him, an invitation that I happily accepted. Quick disclaimer before the party starts: All credit to the initial disclos...
Breaking Badness
c3rb3ru5d3d53c
YouTube video
YouTube video
Cellebrite
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
Cisco’s Talos
Talos Takes 128: Year in Review - Ransomeware and Commodity Loaders Edition By Madison Burns Friday, February 10, 2023 13:02 2022YiR Year In Review We're back with the final year in review focused episode. This time the focus is on the ever broadening ransomware landscape and the commodity malware loaders that often support it. I'll be joined by one of the researchers from the year in review report, Aliza Johnson to talk about what we saw on the ransomware landscape over the last year as well as...
Cloud Security Podcast by Google
EP 107 How Google Secures It's Google Cloud Usage at Massive Scale Guest: Karan Dwivedi, Security Engineering Manager, Enterprise Infrastructure Protection @ Google Cloud 28:50 Subscribe at Google Podcasts.Subscribe at Spotify.Subscribe at Apple Podcasts. Topics covered: Google’s use of Google Cloud is a massive cloud environment with wildly diverse use cases. Could you share, for our listeners, a few examples of the different kinds of things we’re running in GCP?Given that we’re doing these wil...
Cyber Secrets
YouTube video
Didier Stevens
YouTube video
Digital Forensic Survival Podcast
Down the Security Rabbithole Podcast
DtSR Episode 537 - Sergio Talks Threat Intelligence DtSR Episode 537 - Sergio Talks Threat IntelligenceFeb 7, 2023TL;DR: I'm extremely excited to present to you, dear listeners and friends, a wonderful conversation with Sergio Caltagirone, who is quite the authority on 'threat intelligence' - where others talk tools and limited knowledge, Sergio literally was there at the birth of the cyber dawn of the threat intelligence operations we know (or don't know) today. Sergio has been at an agency, at...
InfoSec_Bret
YouTube video
James Spiteri at ‘Oh My Malware!’
YouTube video
Magnet Forensics
The increasing number of cyber regulations around the world can not only be difficult to navigate—they can have a direct impact to your business. If you’re not prepared, your organization could face huge financial penalties. That means it’s become more important than ever to rapidly investigate cyber incidents within the short time frames allowed by enacted legislation. In this webinar, we’ll discuss some of the most relevant cyber regulations facing financial services worldwide, what critical i...
OALabs
YouTube video
RickCenOT
YouTube video
SANS Cloud Security
YouTube video
SANS Cyber Defense
YouTube video
SANS Institute
YouTube video