本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download810At a time when breaches make headlines daily, the healthcare sector is among the most popular adversary targets. Cyberattacks against healthcare organizations have spiked in recent years, disrupting patient care, jeopardizing safety and privacy, and obstructing compliance with industry regulations. In this episode, Cristian is joined by Dennis Egan, director of healthcare services for CrowdStrike, and Drex DeFord, executive healthcare strategist at CrowdStrike, to discuss the impact o...
Alexis Brignoni
YouTube video
Black Hills Information Security
YouTube video
Brought to you by Antisyphon Training — //www.antisyphontraining.com Unpacking the Packet: Demystifying the Internet Protocol Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site
| Serena DiPenti The internet is a product of a global group effort to build an interoperable network connecting billions of devices, regardless of country, region, or manufacturer. That effort yielded hundreds of protocols defining standards for how devices communicate. The Internet Protocol (IP) is the most widely known, but myths and conspiracies have plagued it since its inception. The myths might be widespread but are easy to dispute. Several organizations, including IEEE, IETF, and ISO, ha...
Breaking Badness
Cellebrite
YouTube video
Cloud Security Podcast by Google
Guest: Adrian Sanabria, Director of Valence Threat Labs at Valence Security, ex-analyst 29:29 Subscribe at Google Podcasts.Subscribe at Spotify.Subscribe at Apple Podcasts.Subscribe at YouTube Topics covered: When people talk about “cloud security” they often forget SaaS, what should be the structured approach to using SaaS securely or securing SaaS?What are the incidents telling us about the realistic threats to SaaS tools?Is the Microsoft 365 breach a SaaS breach, a cloud breach or something e...
CyberDefenders
YouTube video
Cyberwox
YouTube video
Detection: Challenging Paradigms
Detection: Challenging ParadigmsNov 13, 2023Share00:0059:05Episode 35: Luke JenningsDCP is back! New intro, new cover, new host! With Jonny stepping away from the podcast, Luke has moved into the co-host position with Jared. On this first episode, we are joined by Luke Jennings of Push Security to talk all things SaaS. Links: //github.com/pushsecurity/saas-attacks//pushsecurity.com/blog/saas-attack-techniques///pushsecurity.com/blog/samljacking-a-poisoned-tenant///pushsecurity.com/blog/nearly-in...
Digital Forensic Survival Podcast
Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
InfoSec_Bret
YouTube video
YouTube video
Insane Forensics
- Living off the Land: How to Hunt for and Respond to Industrial Cybersecurity Incidents using LolBins
YouTube video
John Hammond
YouTube video
LASCON
YouTube video
YouTube video
YouTube video
Magnet Forensics
YouTube video
Whenever an app ends up on a modern smartphone, it has to first ask for permission from the user for its functions. These permissions can be standard or considered ‘sensitive.’ Join us for this next episode of Mobile Unpacked with Chris Vance to learn how to use this information to track insights about the 3rd party apps installed on a device, what they have done or not done, and whether or not their behavior is malicious. After viewing this webinar, you can download a certificate of completion ...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Jack Mott to discuss the movie "Heat" and its relevance to social engineering and threat actor psychology. They also chat about the challenges of identifying real threats in the world of information security, highlighting the need for vigilance in detecting both evident and subtle threats. The conver...
MSAB
YouTube video
YouTube video
Richard Davis at 13Cubed
YouTube video
Sandfly Security
Evasive Linux Malware Detection Video Presentation (BPFDoor)Linux Forensics Videos Presentations Linux Security Malware EducationDateNovember 14, 2023AuthorThe Sandfly Security TeamSandfly founder Craig Rowland recently spoke at the Oslo Cold Incident Response Conference on evasive Linux malware. Although talks were not recorded, he made a video of the presentation he gave below.This talk focused on the infamous BPFDoor backdoor. BPFDoor used a combination of simple evasion techniques to avoid d...
SANS
A Visual Summary of SANS HackFest Summit Alison Kim A Visual Summary of SANS HackFest Summit Check out these graphic recordings created in real-time throughout the event for SANS HackFest Summit 2023 November 16, 2023 On November 16-17, attendees joined us in Hollywood, CAÂ or tuned in Live Online for the SANS HackFest Summit!We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through...
SANS Cloud Security
YouTube video