解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 24 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Adam at Hexacorn

June 9, 2023 in Batch Analysis, Clustering, Software Releases One of the most important (basic) technical skills in cybersecurity are: Knowing Excel (or Google sheets)Knowing basic programming/scripting (bash, cmd, powershell, vbs, vba, autoit, python, perl, etc.)Knowing and staying up to date with tools I covered item #1 a few times. I did cover #2 to some extent as well, but I’d like to expand on it today. And #3 is your kinda FOMO at work – there are way too many projects/tools available toda...

Seth Land at ADF Solutions

Posted by Seth Land on June 7, 2023 Find me on: LinkedIn Tweet Homeland security investigations have become increasingly complex in recent years, with various digital evidence making up a large portion of the evidence. Homeland Security uses digital forensic software to identify and investigate potential threats to U.S. national security. They can investigate evidence in a wide range of cases such as terrorism, human trafficking, child exploitation, drug trafficking, illegal immigration, and ill...

Chris Doman at Cado Security

Monica Harris at Cellebrite

Decrypting a Defense

digitalforensicslas.substack.comCopy linkFacebookEmailNotesOtherFBI Botch an iPhone Search, ShotSpotter Rebrands, Surveillance Policy, & MoreVol. 4, Issue 6The Digital Forensics UnitJun 5, 20231ShareMTA Video Surveillance Sign in a Subway Station by Jerome D. Greco is licensed under CC BY 4.0June 5, 2023Welcome to Decrypting a Defense, the monthly newsletter of the Legal Aid Society’s Digital Forensics Unit. In this issue, Shane Ferro reviews the digital forensic failures by the FBI in the prose...

Dragos

By Dragos, Inc. 06.06.23 LinkedIn Twitter Facebook Email Our CEO Robert M. Lee sent the following email to the company today, to share the difficult news about a layoff of 50 Dragos employees. Details include why this decision, as hard as it was, was necessary to maintain our trajectory as a business, ensure long-term continued growth and success, and continue to deliver on our mission for our customers. Team, Today I am sharing with you a hard decision related to adjustments Dragos must make to...

Oleg Afonin at Elcomsoft

June 8th, 2023 by Oleg AfoninCategory: «General» Synology DSM 7.2 introduced a highly anticipated feature: volume-level encryption. This data protection mechanism works faster and has less limitations than shared folder encryption, which was the only encryption option supported in prior DSM releases. However, upon investigation, we determined that the implementation of the encryption key management mechanism for full-volume encryption fails to meet the expected standards of security for encrypte...

June 9th, 2023 by Oleg AfoninCategory: «General» In the realm of password recovery, benchmarking the speed of attacks holds significant importance. It is a customary practice to gauge the speed of attacks on various data formats using diverse hardware configurations. These tests yield results that are visually represented through graphs clearly demonstrating the performance of our products. However, these graphical representations merely scratch the surface of a much broader scope. Today, we del...

Forensic Focus

GreyNoise

PricingBlogDocumentationLog InProductGreyNoise identifies internet scanners and common business activity in your security events so you can make confident decisions, faster!Product OverviewExploreSearchIP SimilarityTrendsInvestigateIP TimelineIP DetailsTag DetailsActBlocklistsAlertsIntegrateIntegrationsAPISolutionsGreyNoise deploys solutions tailored to the needs of specific industries and use cases.VerticalsHealthcareFinancial ServicesGovernmentUse CasesMaximize SOC EfficiencyMass Exploitation ...

Intezer

Written by Itai Tevet - 6 June 2023 CountryUnited StatesCanadaAfghanistanAlbaniaAlgeriaAndorraAngolaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBrazilBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChinaColombiaComorosDemocratic Republic of the Congo (Kinshasa)Congo, Republic of(Brazzaville)Costa RicaCroatiaCuba...

Written by Intezer - 8 June 2023 CountryUnited StatesCanadaAfghanistanAlbaniaAlgeriaAndorraAngolaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBrazilBruneiBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChinaColombiaComorosDemocratic Republic of the Congo (Kinshasa)Congo, Republic of(Brazzaville)Costa RicaCroatiaCubaCyp...

Owen Walsh at ParaFlare

Published by Owen Walsh | 7 June 2023 Owen Walsh, Director of Managed Risk ServicesJune 7, 20237 min read.At ParaFlare, we have the unfortunate task of working with Australian businesses in their darkest hour.Considering the increasing frequency of cyber attacks impacting Australian businesses, we believe that we have a duty and an opportunity to share our valuable insights on how executive teams can enhance their preparedness in responding to such events.The first 48Like the TV show of the earl...

Joakim Schicht at ‘Plain Binary’

Walk through of a bug in the Volume Shadow Copy driver - volsnap.sys BackgroundAn issue was detected with shadow copies when using Arsenal Image Mounter as part of an analysis of a disk image. Intensive debugging followed and after some time it was clear that the bug was in volsnap.sys and Arsenal Image Mounter had absolutely nothing to do about the issue. The main challenge during the investigation was that the issue could not be reliably reproduced, and only in rare cases until it was further ...

Grace Chi at Pulsedive

Our roundup of the best cyber threat intelligence events you won't want to miss. Grace Chi Jun 9, 2023 • 4 min read "What events should I be going to?" This is a question we often get by both emerging and established security professionals interested in 1) advancing their cyber threat intelligence chops 2) finding kindred spirits. In this blog, we introduce some of the most popular and important CTI conferences throughout the year, along with a summary and helpful resources.The TitansThere are t...

Lisa Forte at Red Goat

Salvation DATA

Knowledge 2023-06-06 Content Introduction Evidence Collection and Preservation Data Recovery and Analysis Reporting and Presentation of Findings Legal Considerations and Ethical Practices Conclusion Content Introduction Evidence Collection and Preservation Data Recovery and Analysis Reporting and Presentation of Findings Legal Considerations and Ethical Practices Conclusion Introduction In today’s investigations, digital forensics services, including computer forensics services, are essential fo...

Knowledge 2023-06-07 Content Intro Forensic Advantage in Investigations Forensic Advantage in Litigation Forensic Advantage in Cybersecurity Forensic Advantage in Financial Analysis Conclusion Content Intro Forensic Advantage in Investigations Forensic Advantage in Litigation Forensic Advantage in Cybersecurity Forensic Advantage in Financial Analysis Conclusion Intro Forensics is the method of collecting, analyzing, and preserving evidence to be used later in criminal and civil investigations. ...

SANS

homepage Open menu Go one level top Train and Certify Train and Certify Immediately apply the skills and techniques learned in SANS courses, ranges, and summits Overview Courses Overview Full Course List By Focus Areas Cloud Security Cyber Defense Cybersecurity and IT Essentials DFIR Industrial Control Systems Offensive Operations Management, Legal, and Audit By Skill Levels New to Cyber Essentials Advanced Expert Training Formats OnDemand In-Person Live Online Free Course Demos Training Roadmap...

Security Investigation

Editors Pick Digital stores for legally challenging products – How are they handled? By SOC CSIRT - June 7, 2023 0 In the context of digital stores, legally challenging products refer to goods or digital content that raise legal concerns or controversies. These products may include items that infringe intellectual property rights, violate consumer protection laws, promote illegal activities, or are subject to specific regulations. Examples of legally challenging products can range from counterfe...