本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
AhmedS Kasmani
YouTube video
Anuj Soni
YouTube video
ArcPoint Forensics
YouTube video
YouTube video
Black Hills Information Security
Brought to you by Antisyphon Training — //www.antisyphontraining.com Abusing Active Directory Certificate Services – Part One Talkin’ About Infosec News – 10/10/23 Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (3) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (31) Ben Burkhart (1) Blue Team (89) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham ...
Brought to you by Antisyphon Training — //www.antisyphontraining.com Talkin’ About Infosec News – 10/9/2023 Abusing Active Directory Certificate Services – Part 2 Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (3) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (31) Ben Burkhart (1) Blue Team (89) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham (...
YouTube video
YouTube video
Breaking Badness
Cellebrite
YouTube video
CYBERWOX
YouTube video
Digital Forensic Survival Podcast
Doug Burks at Security Onion
These recordings are also available at //securityonion.net/conference.Don't forget to subscribe to our YouTube channel to help us reach 10K subscribers!//securityonion.net/youtube Posted by Doug Burks at 9:58 AM Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: conference, presentations, recordings, security onion conference, socaugusta, speakers, videos No comments: Post a Comment Newer Post Older Post Home Subscribe to: Post Comments (Atom) Security Onion Security ...
FIRST
YouTube video
Gerald Auger at Simply Cyber
YouTube video
InfoSec_Bret
YouTube video
Intel471
Oct 10, 2023 Bex Nitert is an incident response and forensics professional in Australia. She describes herself as a digital firefighter who helps organizations after they’ve been hacked. She often investigates phishing, the term for stealing login credentials with the aim of taking over accounts and systems. And there’s a threat actor who performs this credential theft on an industrial scale. Bex found him operating in the open. Many of the frauds, scams and data breaches that are common these d...
John Hammond
YouTube video
YouTube video
YouTube video
Justin Tolman at AccessData
YouTube video
Karsten Hahn at Malware Analysis For Hedgehogs
YouTube video
LaurieWired
YouTube video
Magnet Forensics
While a convenient and efficient method of transferring files, Apple’s AirDrop feature has recently been used to share unwelcomed images of nudity aka ‘cyber flashing’ as well as generalized threats to the public. Since AirDrop does not rely on a network provider, phone number, or email address for transmission to nearby devices, the identification of an unknown sender is problematic. The receiving device may only see the user-defined friendly name of the transmitter and there is no record of th...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Christine Fossaceca. Christine is a senior mobile security researcher at Microsoft, specializing in iOS and mobile exploit development. Christine and Sherrod discuss mobile device security and privacy concerns, mainly focusing on Apple AirTags and similar tracking devices, concentrating on the potential for misuse ...
SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Matthew Zorich, a Principal Consultant with Microsoft Incident Response. Sherrod and Matt discuss his motivation for creating accessible and open-source forensics tools and resources for entry-level forensics, aiming to guide those without extensive resources. They also examine the importance of helping s...
SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Threat Intelligence Analyst Simeon Kakpovi, Intelligence Analyst Lauren Podber, and Senior Hunt Analyst Emiel Haeghebaert. In this episode, Sherrod and guests explore the evolving nature of the Iranian APT group known as "Peach Sandstorm." They discuss how they mature over time while providing valuable in...
MSAB
YouTube video
YouTube video
Nuix
YouTube video
Richard Davis at 13Cubed
YouTube video
RickCenOT
YouTube video
SANS
YouTube video
Security Onion
YouTube video
Sofia Marin
YouTube video
The Cyber Mentor
YouTube video