解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 32 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Anuj Soni

YouTube video

Black Hills Information Security

YouTube video

A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories. Brought to you by: /// 📄 Antisyphon Training August 2023 Blue Team Summit: //www.antisyphontraining.com/training/blue-team/2023/06/blue-team-summit-coming-in-august-2023/ /// 📄 Black Hills Information Security//www.blackhillsinfosec.com/ /// 📄 Antisyphon Training//www.antisyphontraining.com/ Welcome to Shark Week: A Guide for Getting Started with Wireshark and TShark Join Us for Camp BHIS @ DEF...

Breaking Badness

Cellebrite

YouTube video

YouTube video

cloudyforensics

Azure ForensicsForensic Labs·Follow4 min read·Jul 31--ListenShareContinuing our video tutorials on cloud incident response and forensics, our next video is on forensics in Azure:How can you prepare for an incident in Azure?Know Your DataIdentify your crown jewels. Do you have particularly sensitive information, like Personally Identifiable Information (PII) or Payment Card Industry (PCI) data?If so, you need to know exactly where it lives and what systems process the data. This also includes any...

Cyber Secrets

YouTube video

YouTube video

YouTube video

Cyber Social Hub

YouTube video

Digital Forensic Survival Podcast

Huntress

YouTube video

InfoSec_Bret

YouTube video

John Hubbard at ‘The Blueprint podcast

Mandiant

Aug 10 2023, 5:00am UTCDuration: 49 minsPresented byDan Vetrivanathan, APAC Customer Engineer, Mandiant, now a part of Google CloudAbout this talkThe best method for breach preparation is ASSUMED as opposed to the initial IF which then moved onto WHEN. Security teams should approach validation using a trusted actor methodology by simulating breaches as authorized users. This will identity business risks generated from security weaknesses, vulnerabilities and mis-configurations. The ultimate targ...

MSAB

YouTube video

SANS

YouTube video

YouTube video

YouTube video

Sofia Marin

YouTube video

YouTube video

The Cyber Mentor

YouTube video