解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 38 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Fabian Mendoza at AboutDFIR

AboutDFIR Site Content Update – 09/15/2023 By Fabian MendozaOn September 15, 2023September 13, 2023 Tools & Artifacts – Windows – new entries added – Level.io – RMM – Level.io: Forensic Artifacts and Evidence, Microsoft 365 (M365) – Wrangling the M365 UAL with SOF-ELK and CSV Data (Parts 1-3), OneDriveExplorer – What’s New in OneDriveExplorer, Microsoft EdgeMicrosoft Edge Forensics: Screenshot History Tools & Artifacts – iOS – new entry added – WhatsApp – iOS WhatsApp Forensics with Belkasoft...

ADF Solutions

Posted by ADF Solutions on September 15, 2023 Find me on: Facebook LinkedIn Twitter Tweet Investigators face the daunting task of analyzing vast amounts of digital data to uncover critical evidence. Customizable search profiles are a game-changer in the field of digital forensics. By allowing investigators to fine-tune their search criteria and focus on the most relevant data. To streamline this process, Mobile Device Investigator (MDI) offers an indispensable feature known as "Search Profiles."...

Blake Sawyer at Amped

Blake Sawyer September 14, 2023 Hey everyone! This summer has been an exciting time for us at Amped Software. A little over a month after releasing Amped Engine, a new product to help companies and agencies deploy our conversion engine on a wide scale, we are back with some big news. Starting today, every one of our products will be available to your agency as a floating license. You might be wondering, “Why is this such big news?”. Let’s dive right into it. Contents 1 Floating Licenses 2 Conclu...

Jack Zalesskiy at Any.Run

How to Hire the Right Malware Analyst for Your Team: Our Experience September 12, 2023 Add comment 470 views 9 min read HomeCybersecurity LifehacksHow to Hire the Right Malware Analyst for Your Team: Our Experience Recent posts ChatGPT-powered Malware Analysis: Review Sandbox Results with AI 2158 0 How to Hire the Right Malware Analyst for Your Team: Our Experience 470 0 How to Use Interactivity in a Malware Sandbox 740 0 HomeCybersecurity LifehacksHow to Hire the Right Malware Analyst for Your ...

Jonathan Tanner at Barracuda

Topics: Sep. 14, 2023 | Jonathan Tanner Tweet Share Share Tweet Share Share Human error is to blame for the majority of malware when it comes to gaining access to a device or network. Whether it's in the form of a user tricked by a Trojan or a software developer accidentally introducing a bug that becomes exploited. However, this not the only way in which malware can gain a foothold, which brings us to the third method of infection — implants. Implants are not mistakes, but rather intentional in...

Monica Harris at Cellebrite

Forensic Focus

Julia Gately and Lexie Van Den Heuvel

New to Cyber: Preston McNair Background As part of JnL Forensics’ New to Cybersecurity Series, we have been holding discussions with individuals in the cybersecurity and digital forensics and incident response (“DFIR”) community who have five (5) or fewer years of experience. Our goal is to present information to new and interested cybersecurity professionals about the career paths young professionals have taken, challenges they have faced, and parts of their stories that excite them the most. I...

Lenny Zeltser

Preparing for cybersecurity and data privacy incidents involves creating checklists and documented plans to enable the response team to do their best during the incident. Preparation also includes creating a template that the team can use as the basis for the incident report, which is critical to ensuring that the incident is handled well.We created such an incident report template when we developed our incident response procedures at Axonius. I’m happy to share the public version of this templa...

LockBoxx

MISP

  • go to homepage Toggle Navigation Home Features Data Models Data Models MISP core format MISP taxonomies MISP Galaxy MISP Objects Default feeds Documentation Documentation Documentation OpenAPI Tools Support Contributing Research projects Research topics Legal License Legal and policy GDPR ISO/IEC 27010:2015 NISD Communities Download Events Upcoming events Past events Webinars Hackathon MISP Summit News Contact Reaching us Contact Us Press inquiries Professional Services Commercial Support Secu...

Revo4n6

Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6HomeBlog postsDocsAbout & ContactMoreHomeBlog postsDocsAbout & ContactHomeBlog postsDocsAbout & Contact Digital forensics unveiled - blog & news Copyright © 2023 Revo4n6 - All Rights Reserved. This website uses cookies.We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.Accept

Salvation DATA

Knowledge 2023-09-13 Content Introduction Key Features to Look For Top eDiscovery Tools in 2023 Use Cases Future Trends Conclusion Content Introduction Key Features to Look For Top eDiscovery Tools in 2023 Use Cases Future Trends Conclusion Introduction There is an exponential increase in the amount of electronic data in this era of digital transformation. With this increase, it is more important than ever to have the tools necessary to search for, find, and organize pertinent digital data for l...

SANS

homepage Open menu Go one level top Train and Certify Train and Certify Immediately apply the skills and techniques learned in SANS courses, ranges, and summits Overview Courses Overview Full Course List By Focus Areas Cloud Security Cyber Defense Cybersecurity and IT Essentials DFIR Industrial Control Systems Offensive Operations Management, Legal, and Audit By Skill Levels New to Cyber Essentials Advanced Expert Training Formats OnDemand In-Person Live Online Free Course Demos Training Roadmap...

SANS Cloud Security Building Strong Foundations: Exploring IaC for Cloud IAM Go on a journey to explore the synergy between Identity and Access Management (IAM) and Infrastruture as Code (IaC). September 15, 2023 IntroductionIn the rapidly evolving landscape of cloud computing, security remains paramount. Ensuring the confidentiality, integrity, and availability of your cloud resources is a complex task that requires a well-defined approach. A crucial component of this strategy lies in Identity ...