本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download691When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials. Many turn to access brokers, the sellers of credentials, exploits and other tools threat actors can buy and use to gain initial access. In this episode, we discuss who access brokers are, how they gain and sell access, and their crucial role in the cybercrime ecosystem.Copyright 2023 All rights reserved.Version: 20230822
Alexander Adamov at ‘Malware Research Academy’
YouTube video
Alexis Brignoni
YouTube video
YouTube video
Application Security Weekly
YouTube video
Arkime
YouTube video
Black Hat
YouTube video
Black Hills Information Security
YouTube video
Breaking Badness
Cellebrite
YouTube video
CyberDefenders
YouTube video
YouTube video
YouTube video
Cyborg Security
Upcoming Podcast October 3, 2023 JOIN US FOR A TERRIFYINGLY FUN EVENING OF THREAT HUNTING! 🎃 This Halloween season, join a rag-tag bunch of threat hunters around the campfire fire as they come out of the (haunted) woods to talk about about the bone-chilling topics that affect threat hunters, security researchers, and threat intelligence professionals. GET CHILLINGLY INTERACTIVE WITH THE THREAT HUNTING COMMUNITY! 💀 But this podcast experience has a few tricks and a lot of treats! Join our Discord...
Digital Forensic Survival Podcast
Dr Josh Stroschein
YouTube video
Dr. Meisam Eslahi at ‘Nothing Cyber’
YouTube video
Huntress
YouTube video
YouTube video
InfoSec_Bret
YouTube video
John Hammond
YouTube video
Justin Tolman at AccessData
YouTube video
Karsten Hahn at Malware Analysis For Hedgehogs
YouTube video
Louis Mastelinck
October 5, 2023 Azure Active Directory Join us in this eye-opening video as we delve into the world of cybersecurity and take on a real-life Adversary-in-the-Middle (AITM) attack. We’ll explain what an AITM attack is and, in a daring move, intentionally subject ourselves to a phishing attempt to gain insights into how we can better safeguard our online security. In this investigation, we’ll explore the tactics and techniques used by cyber adversaries to manipulate and compromise unsuspecting vic...
Magnet Forensics
Forensic workstations can be expensive! Join us as we discuss the myriad of advantages when conducting forensic examinations in the Cloud. We will walk through the setup, installation, use, and advantages of using Magnet AXIOM CYBER in the Microsoft Azure. You’ll get a chance to see some of the benefits of this approach, including, cost savings, reducing redundancy, the ability to do off-network collections, and the advantage of using a clean VM for every examination. After viewing this webinar,...
Microsoft Security Insights Show
Microsoft Security Insights ShowSubscribeSign inShare this postMicrosoft Security Insights Show Episode 172 - Sameh Younissecurityinsights.substack.comCopy linkFacebookEmailNotesOtherOct 4 • 1HR 6MMicrosoft Security Insights Show Episode 172 - Sameh YounisProm dateOct 412Share this postMicrosoft Security Insights Show Episode 172 - Sameh Younissecurityinsights.substack.comCopy linkFacebookEmailNotesOther 1×0:00-1:05:41Open in playerListen on);Substack AppDownload MP3Get a private RSS link for li...
Microsoft Threat Intelligence Podcast
MSAB
YouTube video
Paraben Corporation
YouTube video
RickCenOT
YouTube video
Securizame
The Citizen Lab
The CyberWire
SubscribeApple PodcastsApple PodcastsGoogle PodcastsCastboxOvercastOvercastSpotifyRSSShow NotesDeepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromi...