解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 47 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download810At a time when breaches make headlines daily, the healthcare sector is among the most popular adversary targets. Cyberattacks against healthcare organizations have spiked in recent years, disrupting patient care, jeopardizing safety and privacy, and obstructing compliance with industry regulations. In this episode, Cristian is joined by Dennis Egan, director of healthcare services for CrowdStrike, and Drex DeFord, executive healthcare strategist at CrowdStrike, to discuss the impact o...

Alexis Brignoni

YouTube video

Black Hills Information Security

YouTube video

Brought to you by Antisyphon Training — //www.antisyphontraining.com Unpacking the Packet: Demystifying the Internet Protocol Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

| Serena DiPenti The internet is a product of a global group effort to build an interoperable network connecting billions of devices, regardless of country, region, or manufacturer. That effort yielded hundreds of protocols defining standards for how devices communicate. The Internet Protocol (IP) is the most widely known, but myths and conspiracies have plagued it since its inception. The myths might be widespread but are easy to dispute. Several organizations, including IEEE, IETF, and ISO, ha...

Breaking Badness

Cellebrite

YouTube video

Cloud Security Podcast by Google

Guest: Adrian Sanabria, Director of Valence Threat Labs at Valence Security, ex-analyst 29:29 Subscribe at Google Podcasts.Subscribe at Spotify.Subscribe at Apple Podcasts.Subscribe at YouTube Topics covered: When people talk about “cloud security” they often forget SaaS, what should be the structured approach to using SaaS securely or securing SaaS?What are the incidents telling us about the realistic threats to SaaS tools?Is the Microsoft 365 breach a SaaS breach, a cloud breach or something e...

CyberDefenders

YouTube video

Cyberwox

YouTube video

Detection: Challenging Paradigms

Detection: Challenging ParadigmsNov 13, 2023Share00:0059:05Episode 35: Luke JenningsDCP is back! New intro, new cover, new host! With Jonny stepping away from the podcast, Luke has moved into the co-host position with Jared. On this first episode, we are joined by Luke Jennings of Push Security to talk all things SaaS. Links: //github.com/pushsecurity/saas-attacks//pushsecurity.com/blog/saas-attack-techniques///pushsecurity.com/blog/samljacking-a-poisoned-tenant///pushsecurity.com/blog/nearly-in...

Digital Forensic Survival Podcast

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

InfoSec_Bret

YouTube video

YouTube video

Insane Forensics

YouTube video

John Hammond

YouTube video

LASCON

YouTube video

YouTube video

YouTube video

Magnet Forensics

YouTube video

Whenever an app ends up on a modern smartphone, it has to first ask for permission from the user for its functions. These permissions can be standard or considered ‘sensitive.’ Join us for this next episode of Mobile Unpacked with Chris Vance to learn how to use this information to track insights about the 3rd party apps installed on a device, what they have done or not done, and whether or not their behavior is malicious. After viewing this webinar, you can download a certificate of completion ...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Jack Mott to discuss the movie "Heat" and its relevance to social engineering and threat actor psychology. They also chat about the challenges of identifying real threats in the world of information security, highlighting the need for vigilance in detecting both evident and subtle threats. The conver...

MSAB

YouTube video

YouTube video

Richard Davis at 13Cubed

YouTube video

Sandfly Security

Evasive Linux Malware Detection Video Presentation (BPFDoor)Linux Forensics Videos Presentations Linux Security Malware EducationDateNovember 14, 2023AuthorThe Sandfly Security TeamSandfly founder Craig Rowland recently spoke at the Oslo Cold Incident Response Conference on evasive Linux malware. Although talks were not recorded, he made a video of the presentation he gave below.This talk focused on the infamous BPFDoor backdoor. BPFDoor used a combination of simple evasion techniques to avoid d...

SANS

A Visual Summary of SANS HackFest Summit Alison Kim A Visual Summary of SANS HackFest Summit Check out these graphic recordings created in real-time throughout the event for SANS HackFest Summit 2023 November 16, 2023 On November 16-17, attendees joined us in Hollywood, CAÂ or tuned in Live Online for the SANS HackFest Summit!We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through...

SANS Cloud Security

YouTube video

Securizame