本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。 一部の記事は Google Bard を使い要約しています。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Black Hills Information Security
YouTube video
YouTube video
Shenetworks’ Guide to Landing Your First Tech Job Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site
Breaking Badness
Cellebrite
YouTube video
cloudyforensics
EKS Forensics & Incident ResponseForensic Labs·Follow3 min read·5 days ago--ListenShareWe’ve continued our series on Cloud Forensics and Incident Response training with this video tutorial on AWS EKS:How do you respond to a compromised EKS Container or Node?If you’ve identified a potentially compromised container in EKS, there are two potential ways forward:If the container is running on an underlying EC2, then refer to the suggested steps above for immediate actions.If the container is running ...
Cyber Social Hub
YouTube video
YouTube video
Digital Forensic Survival Podcast
Hacker Valley Blue
YouTube video
InfoSec_Bret
YouTube video
John Hammond
YouTube video
YouTube video
YouTube video
John Hubbard at ‘The Blueprint podcast’
Karsten Hahn at Malware Analysis For Hedgehogs
YouTube video
Magnet Forensics
YouTube video
YouTube video
YouTube video
YouTube video
With the continued development of augmented and virtual reality, investigators in law enforcement and the private sector are starting to encounter crimes happening in the “Metaverse”. What methods can we use to extract data from Oculus devices and what challenges can we expect? This talk will dive into methods to get after the data from VR devices. We will discuss logical acquisitions, all the way to chip-off of an Oculus. Live demos with Oculus/Meta devices using Magnet AXIOM will be used durin...
All too often during an investigation, it comes to light that adversaries are leveraging existing remote access tools for initial access and lateral movement. This trend is continuously on the rise and tends to go unnoticed due to the lack of available logging or not understanding what the available logs provide. This talk will not only address the aforementioned, but I also will be sharing custom tools that have proved to be beneficial in analysis against some of the most sophisticated actors. ...
Mostafa Yahia
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
MSAB
YouTube video
SANS
YouTube video
YouTube video
SANS Cloud Security
YouTube video
YouTube video
The Cyber Mentor
YouTube video