解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 40 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Avanan

VIDEO: Phishing via Google Ads Posted by Jeremy Fuchs on September 25, 2023 Tweet We've been writing more and more about the ways in which hackers are utilizing Google services to launch phishing attacks. One of the ways they are doing this is by leveraging Google Ads. In this video, we'll break down the how and why behind this attack, and what you can do to stay safe. Tweet Topics: Blog NEXT POST: Attack Breakdown: BEC in Action Get a Demo Experience the power & simplicity. Popular Categories B...

Black Hat

YouTube video

YouTube video

Black Hills Information Security

YouTube video

Brought to you by Antisyphon Training — //www.antisyphontraining.com Talkin’ About Infosec News – 9/18/2023 Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (1) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (31) Ben Burkhart (1) Blue Team (87) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham (3) Craig Vincent (1) Dale Hobbs (3) Daniel Pizarro (1) ...

YouTube video

Breaking Badness

Cellebrite

YouTube video

Cyber Security Interviews

By Douglas Brush | 09/25/2023 | 0 This is the 5th part of the podcast’s return after a brief hiatus. Daniel Ayala continues his interview of me. In this fifth part, we will discuss the start-up resources we provided in our Hang Out A Shingle presentation, what I am doing with Accel Consulting, selling to CISOs, tips to avoid when presenting cyber services, the selling to CISOs Master Class we are developing, and so much more! Tagged ← #126 – Douglas Brush (Part 4): Dollars and Cents, Not Bytes L...

Digital Forensic Survival Podcast

Faan Ross

Posted on Sep 25, 2023threat hunting c2lecture slides - PDFfull threat hunting c2 using memory forensics course suggested lecturesKeynote: Cobalt Strike Threat Hunting | Chad TilburySecuri-Tay 2017 - Advanced Attack DetectionRaphael Mudge: In-memory Evasion connectyoutubexgithubemail threat_huntingC2dll_injection 2023 | hack the planet | Archie Theme | Built with Hugo

Posted on Sep 27, 2023startendtopic00:0023:03pre-show banter23:0358:47exploring ideas related to threat hunting58:471:02:34practical demo1:02:341:05:11conclusion1:05:11endq+ahad an incredible time with the active countermeasures crew doing a talk on the use of memory forensics in threat hunting dll-injected c2 beacons. super grateful for the opportunity to share, and for all the attendees - the feedback was incredible.lecture slides - PDFfull threat hunting c2 using memory forensics course sugge...

Huntress

YouTube video

YouTube video

InfoSec_Bret

YouTube video

Intel471

Sep 26, 2023 Ransomware attacks have sharply increased in 2023, and payments to ransomware gangs and affiliates are nearing all-time highs. With law enforcement and governments sharply focused on disrupting and imposing costs on ransomware groups, why is ransomware stubbornly sticking around? In this edition of Studio 471, Jacqueline Burns Koven of Chainalysis discusses how ransomware is evolving and what challenges it poses for defenders. Participants:Jacqueline Burns Koven, Head of Cyber Threa...

John Hammond

YouTube video

YouTube video

Magnet Forensics

YouTube video

YouTube video

Magnet RESPONSE lets investigators and non-technical users easily collect and preserve critical data relevant to incident response investigations from local endpoints. But what happens when you need to collect from dozens of endpoints? That’s where the CLI (Command Line Interface) functionality of Magnet RESPONSE and comes into play. Join Security Forensics Consultant, Doug Metz, to learn how to collect from dozens of endpoints with Magnet RESPONSE and PowerShell and collect just the artifacts y...

With Samsung’s stance on device-based encryption, there are multiple additional factors in play for those devices versus other Android handsets. One such factor is the Samsung Secure Folder which is part of their Knox security platform. Join Matt Fullerton and Chris Vance for this Mobile Unpacked episode where they will explore what Secure Folder is, how you can access it, and what information lies within. After viewing this webinar, you can download a certificate of completion from the event co...

MSAB

YouTube video

Sofia Marin

YouTube video

YouTube video