解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 45 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download746China is the source of some of the most prolific and aggressive nation-state cyber activity organizations face. Every business vertical, across every geography, is affected by China’s unrelenting focus on growth and power. In this episode, Adam and Cristian take you through the evolution of Chinese threat activity from the early 2010s through today, closely examining the myriad ways they seek to build influence, the industries they target along the way and the threat actors linked to ...

Alexis Brignoni

YouTube video

Black Hills Information Security

YouTube video

YouTube video

Brought to you by Antisyphon Training — //www.antisyphontraining.com Rotating Your Passwords After a Password Manager Breach Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (3) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (32) Ben Burkhart (1) Blue Team (89) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham (3) Craig Vincent (1) Dale Hobbs (3) Da...

Breaking Badness

Cellebrite

YouTube video

YouTube video

Digital Forensic Survival Podcast

Desi at Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

Huntress

YouTube video

YouTube video

InfoSec_Bret

YouTube video

John Hammond

YouTube video

Justin Tolman at AccessData

YouTube video

YouTube video

Magnet Forensics

Microsoft 365 presents a rich and diverse artifact landscape for digital forensic investigators and incident responders to take advantage of. In this session we will authenticate as an M365 user to explore the options available and acquire some user data before taking a look at the results, all in AXIOM Cyber. After viewing this webinar, you can download a certificate of completion from the event console. Gavin Hornsey Corporate Solutions Consultant, Magnet Forensics Gavin Hornsey Corporate Solu...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Microsoft threat research experts to talk about the activities of a threat actor known as Octo Tempest (which overlaps with research associated with 0ktapus, Scattered Spider, and UNC3944) and the blog released by Microsoft threat intelligence and Microsoft incident response groups. The dis...

MSAB

YouTube video

Nextron Systems

YouTube video

RickCenOT

YouTube video

Securizame

Sophos

…and introducing Sophos X-Ops’ new video channel, which provides viewers (and readers too) with a little something extra Written by Sophos X-Ops November 03, 2023 Threat Research featured video youtube On our new Sophos X-Ops video channel, Robert Weiland of the Incident Response team walks viewers through a data-exfiltration investigation, starting with an idea of which system on the affected estate might have been involved with the incident, and ending with an understanding of the tools used b...