本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
AhmedS Kasmani
YouTube video
Black Hills Information Security
YouTube video
Breaking Badness
Cellebrite
YouTube video
Dark Mode
YouTube video
Digital Forensic Survival Podcast
Dr Josh Stroschein
YouTube video
Dr. Meisam Eslahi at ‘Nothing Cyber’
YouTube video
FIRST
YouTube video
Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
Intel471
? Oct 24, 2023 The Ransomware Task Force was created in 2021 to bring together government, private industry and civil society to create strategies to fight cybercriminal gangs extorting organizations. This year has been challenging with rising attacks, but Megan Stifel of the Institute for Security and Technology says progress is being made. In this edition of Studio 471, Megan discusses the future of the Ransomware Task Force, whether ransom payments should be banned and how organizations are s...
John Hammond
YouTube video
YouTube video
Justin Tolman at AccessData
YouTube video
Magnet Forenics
Mobile devices have become indispensable tools in the modern workplace, enabling more than just checking email. Employees now browse the web, access sensitive company data, and conduct daily business operations on mobile devices. The vast amount of data stored on these devices makes them invaluable sources of evidence in digital forensics investigations. Join Trey Amick, Director of Forensic Consultants, as he takes you on an exciting journey into the world of mobile device forensics, where you ...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Microsoft Senior Security Researcher Graham Dietz. Graham provides intelligence-led recommendations to improve cybersecurity posture in the future. They are creating customer-ready reports and presentations incorporating threat actor attribution, threat detection and hunting guidance, and remediation...
MSAB
YouTube video
Nextron Systems
YouTube video
OALabs
YouTube video
Sandfly Security
Detecting Evasive Linux Malware PresentationRootkits Education Linux Forensics MalwareDateOctober 20, 2023AuthorThe Sandfly Security TeamSandfly founder Craig Rowland gave a presentation for the FIRST Cold Incident Response Conference in Oslo on evasive Linux backdoors and malware below:Evasive Linux Backdoors and Malware PresentationThis talk focused on the infamous BPFDoor backdoor. BPFDoor used a combination of simple evasion techniques to avoid detection on Linux by doing the following:Proce...
SANS Cloud Security
YouTube video
The CyberWire
SubscribeApple PodcastsApple PodcastsGoogle PodcastsCastboxOvercastOvercastSpotifyRSSShow NotesDanny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June w...
The Defender’s Advantage Podcast
Thomas Roccia
Search Thomas Roccia October 26, 2023 Technology 0 380 State-Sponsored Financially Motivated Attacks This is a presentation delivered at Melbourne AISA in October 2023 about a nation state investigation targeting the cryptocurrency industry. Thomas Roccia October 26, 2023 Tweet Share More Decks by Thomas Roccia See All by Thomas Roccia Binary Instrumentation for Malware Analysis fr0gger 2 1.2k Conti Leaks: Practical walkthrough and what can we learn from it fr0gger 0 760 Sharing is Caring: Shari...