解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 42 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

AhmedS Kasmani

YouTube video

Anuj Soni

YouTube video

ArcPoint Forensics

YouTube video

YouTube video

Black Hills Information Security

Brought to you by Antisyphon Training — //www.antisyphontraining.com Abusing Active Directory Certificate Services – Part One Talkin’ About Infosec News – 10/10/23 Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (3) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (31) Ben Burkhart (1) Blue Team (89) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham ...

Brought to you by Antisyphon Training — //www.antisyphontraining.com Talkin’ About Infosec News – 10/9/2023 Abusing Active Directory Certificate Services – Part 2 Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (3) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (31) Ben Burkhart (1) Blue Team (89) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham (...

YouTube video

YouTube video

Breaking Badness

Cellebrite

YouTube video

CYBERWOX

YouTube video

Digital Forensic Survival Podcast

Doug Burks at Security Onion

These recordings are also available at //securityonion.net/conference.Don't forget to subscribe to our YouTube channel to help us reach 10K subscribers!//securityonion.net/youtube Posted by Doug Burks at 9:58 AM Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: conference, presentations, recordings, security onion conference, socaugusta, speakers, videos No comments: Post a Comment Newer Post Older Post Home Subscribe to: Post Comments (Atom) Security Onion Security ...

FIRST

YouTube video

Gerald Auger at Simply Cyber

YouTube video

InfoSec_Bret

YouTube video

Intel471

Oct 10, 2023 Bex Nitert is an incident response and forensics professional in Australia. She describes herself as a digital firefighter who helps organizations after they’ve been hacked. She often investigates phishing, the term for stealing login credentials with the aim of taking over accounts and systems. And there’s a threat actor who performs this credential theft on an industrial scale. Bex found him operating in the open. Many of the frauds, scams and data breaches that are common these d...

John Hammond

YouTube video

YouTube video

YouTube video

Justin Tolman at AccessData

YouTube video

Karsten Hahn at Malware Analysis For Hedgehogs

YouTube video

LaurieWired

YouTube video

Magnet Forensics

While a convenient and efficient method of transferring files, Apple’s AirDrop feature has recently been used to share unwelcomed images of nudity aka ‘cyber flashing’ as well as generalized threats to the public. Since AirDrop does not rely on a network provider, phone number, or email address for transmission to nearby devices, the identification of an unknown sender is problematic. The receiving device may only see the user-defined friendly name of the transmitter and there is no record of th...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Christine Fossaceca. Christine is a senior mobile security researcher at Microsoft, specializing in iOS and mobile exploit development. Christine and Sherrod discuss mobile device security and privacy concerns, mainly focusing on Apple AirTags and similar tracking devices, concentrating on the potential for misuse ...

SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Matthew Zorich, a Principal Consultant with Microsoft Incident Response. Sherrod and Matt discuss his motivation for creating accessible and open-source forensics tools and resources for entry-level forensics, aiming to guide those without extensive resources. They also examine the importance of helping s...

SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Threat Intelligence Analyst Simeon Kakpovi, Intelligence Analyst Lauren Podber, and Senior Hunt Analyst Emiel Haeghebaert. In this episode, Sherrod and guests explore the evolving nature of the Iranian APT group known as "Peach Sandstorm." They discuss how they mature over time while providing valuable in...

MSAB

YouTube video

YouTube video

Nuix

YouTube video

Richard Davis at 13Cubed

YouTube video

RickCenOT

YouTube video

SANS

YouTube video

Security Onion

YouTube video

Sofia Marin

YouTube video

The Cyber Mentor

YouTube video