解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 41 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download691When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials. Many turn to access brokers, the sellers of credentials, exploits and other tools threat actors can buy and use to gain initial access. In this episode, we discuss who access brokers are, how they gain and sell access, and their crucial role in the cybercrime ecosystem.Copyright 2023 All rights reserved.Version: 20230822

Alexander Adamov at ‘Malware Research Academy’

YouTube video

Alexis Brignoni

YouTube video

YouTube video

Application Security Weekly

YouTube video

Arkime

YouTube video

Black Hat

YouTube video

Black Hills Information Security

YouTube video

Breaking Badness

Cellebrite

YouTube video

CyberDefenders

YouTube video

YouTube video

YouTube video

Cyborg Security

Upcoming Podcast October 3, 2023 JOIN US FOR A TERRIFYINGLY FUN EVENING OF THREAT HUNTING! 🎃 This Halloween season, join a rag-tag bunch of threat hunters around the campfire fire as they come out of the (haunted) woods to talk about about the bone-chilling topics that affect threat hunters, security researchers, and threat intelligence professionals. GET CHILLINGLY INTERACTIVE WITH THE THREAT HUNTING COMMUNITY! 💀 But this podcast experience has a few tricks and a lot of treats! Join our Discord...

Digital Forensic Survival Podcast

Dr Josh Stroschein

YouTube video

Dr. Meisam Eslahi at ‘Nothing Cyber’

YouTube video

Huntress

YouTube video

YouTube video

InfoSec_Bret

YouTube video

John Hammond

YouTube video

Justin Tolman at AccessData

YouTube video

Karsten Hahn at Malware Analysis For Hedgehogs

YouTube video

Louis Mastelinck

October 5, 2023 Azure Active Directory Join us in this eye-opening video as we delve into the world of cybersecurity and take on a real-life Adversary-in-the-Middle (AITM) attack. We’ll explain what an AITM attack is and, in a daring move, intentionally subject ourselves to a phishing attempt to gain insights into how we can better safeguard our online security. In this investigation, we’ll explore the tactics and techniques used by cyber adversaries to manipulate and compromise unsuspecting vic...

Magnet Forensics

Forensic workstations can be expensive! Join us as we discuss the myriad of advantages when conducting forensic examinations in the Cloud. We will walk through the setup, installation, use, and advantages of using Magnet AXIOM CYBER in the Microsoft Azure. You’ll get a chance to see some of the benefits of this approach, including, cost savings, reducing redundancy, the ability to do off-network collections, and the advantage of using a clean VM for every examination. After viewing this webinar,...

Microsoft Security Insights Show

Microsoft Security Insights ShowSubscribeSign inShare this postMicrosoft Security Insights Show Episode 172 - Sameh Younissecurityinsights.substack.comCopy linkFacebookEmailNotesOtherOct 4 • 1HR 6MMicrosoft Security Insights Show Episode 172 - Sameh YounisProm dateOct 412Share this postMicrosoft Security Insights Show Episode 172 - Sameh Younissecurityinsights.substack.comCopy linkFacebookEmailNotesOther 1×0:00-1:05:41Open in playerListen on);Substack AppDownload MP3Get a private RSS link for li...

Microsoft Threat Intelligence Podcast

MSAB

YouTube video

Paraben Corporation

YouTube video

RickCenOT

YouTube video

Securizame

The Citizen Lab

The CyberWire

SubscribeApple PodcastsApple PodcastsGoogle PodcastsCastboxOvercastOvercastSpotifyRSSShow NotesDeepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromi...