解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 39 – 2023 - UPCOMING EVENTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

UPCOMING EVENTS

Andreas Sfakianakis at ‘Tilting at windmills’

FIRST CTI Symposium 2023 Agenda is out!! andreas.sfakianakis in conference 3 September 202318 September 2023 301 Words Posts Categories activedefence (2) apt (8) conference (13) csirt (3) cybersecurity (16) dfir (12) ENISA (5) EU (3) inteldirection (3) intelrequirements (4) pentesting (2) redteaming (6) threathunting (9) threatintel (30) tip (6) tradecraft (11) training (6) Search this blog Search for: Blog RSS Feed Subscribe to Blog via Email Email Address: Subscribe My Twitter TimelineMy Tweet...

Black Hills Information Security

YouTube video

Cado Security

Event hosted by Cado SecuritySeptember 28, 2023 – September 28, 2023Online eventReport this eventPeople on LinkedIn are goingJoinKeep up with Demystifying Cloud ForensicsSee who else is going to Demystifying Cloud Forensics, and keep up-to-date with conversations about the event.Join the Demystifying Cloud Forensics experienceAbout this eventCloud computing has become increasingly popular in recent years, and with it, the need for cloud forensics. But what is cloud forensics? There is a widely p...

Cqure Academy

Cyber Social Hub

YouTube video

Dragos

Sep 26 2023, 5:00pm UTCDuration: 60 minsPresented byModerated by Dave Bittner, VP, Producer and Host of The CyberWire Daily and Control Loop podcastsAbout this talkAs technology continues to transform operational capabilities for businesses, cyber threats have also become more sophisticated, introducing the potential for devastating consequences. While OT and IT networks have significantly converged to meet the demands of ongoing modernization, there are still distinct cybersecurity risks for ea...

Magnet Forensics

Magnet RESPONSE lets investigators and non-technical users easily collect and preserve critical data relevant to incident response investigations from local endpoints. But what happens when you need to collect from dozens of endpoints? That’s where the CLI (Command Line Interface) functionality of Magnet RESPONSE and comes into play. Join Security Forensics Consultant, Doug Metz, to learn how to collect from dozens of endpoints with Magnet RESPONSE and PowerShell and collect just the artifacts y...

With Samsung’s stance on device-based encryption, there are multiple additional factors in play for those devices versus other Android handsets. One such factor is the Samsung Secure Folder which is part of their Knox security platform. Join Matt Fullerton and Chris Vance for this Mobile Unpacked episode where they will explore what Secure Folder is, how you can access it, and what information lies within. After viewing this webinar, you can download a certificate of completion from the event co...

OpenText

SANS

YouTube video