本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download746China is the source of some of the most prolific and aggressive nation-state cyber activity organizations face. Every business vertical, across every geography, is affected by China’s unrelenting focus on growth and power. In this episode, Adam and Cristian take you through the evolution of Chinese threat activity from the early 2010s through today, closely examining the myriad ways they seek to build influence, the industries they target along the way and the threat actors linked to ...
Alexis Brignoni
YouTube video
Black Hills Information Security
YouTube video
YouTube video
Brought to you by Antisyphon Training — //www.antisyphontraining.com Rotating Your Passwords After a Password Manager Breach Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (3) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (32) Ben Burkhart (1) Blue Team (89) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham (3) Craig Vincent (1) Dale Hobbs (3) Da...
Breaking Badness
Cellebrite
YouTube video
YouTube video
Digital Forensic Survival Podcast
Desi at Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
Huntress
YouTube video
YouTube video
InfoSec_Bret
YouTube video
John Hammond
YouTube video
Justin Tolman at AccessData
YouTube video
YouTube video
Magnet Forensics
Microsoft 365 presents a rich and diverse artifact landscape for digital forensic investigators and incident responders to take advantage of. In this session we will authenticate as an M365 user to explore the options available and acquire some user data before taking a look at the results, all in AXIOM Cyber. After viewing this webinar, you can download a certificate of completion from the event console. Gavin Hornsey Corporate Solutions Consultant, Magnet Forensics Gavin Hornsey Corporate Solu...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Microsoft threat research experts to talk about the activities of a threat actor known as Octo Tempest (which overlaps with research associated with 0ktapus, Scattered Spider, and UNC3944) and the blog released by Microsoft threat intelligence and Microsoft incident response groups. The dis...
MSAB
YouTube video
Nextron Systems
YouTube video
RickCenOT
YouTube video
Securizame
Sophos
…and introducing Sophos X-Ops’ new video channel, which provides viewers (and readers too) with a little something extra Written by Sophos X-Ops November 03, 2023 Threat Research featured video youtube On our new Sophos X-Ops video channel, Robert Weiland of the Incident Response team walks viewers through a data-exfiltration investigation, starting with an idea of which system on the affected estate might have been involved with the incident, and ending with an understanding of the tools used b...