解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 50 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

ArcPoint Forensics

YouTube video

YouTube video

Black Hills Information Security

The Simplest and Last Internet-Only ACL You’ll Ever Need OSINT for Incident Response (Part 1) Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

YouTube video

| Patterson Cake Being a digital forensics and incident response consultant is largely about unanswered questions. When we engage with a client, they know something bad happened or is happening, but they are uncertain of the “how, when, where, and why.” A significant component of our job is to tease out the “known knowns,” the “known unknowns,” and effectively and efficiently help the client answer the following: Have we been compromised? If “yes,” then: How long have we been compromised? (“dwel...

Breaking Badness

Cellebrite

YouTube video

Check Point

Cisco’s Talos

Beers with Talos Talos Takes About Search Blog Beers with Talos episode 141: The TurkeyLurkey Man wants YOU to read Talos' Year in Review report By Mitch Neff Wednesday, December 6, 2023 05:41 2023YiR Year In Review In this episode the Beers with Talos team, led by special guest Dave Liebenberg, set out to save Thanksgiving. The TurkeyLurkey man is the hero that everybody needs, but perhaps don't deserve.For fans and opposers of Dave's Ranksgiving list, you'll be pleased to know he's back with a...

Cyber Social Hub

How does a Major League Baseball player impact how we do forensics today? We will take a trip back in time and discuss the court case US vs Comprehensive Drug Testing. Let's discuss the background, mistakes made, and what we can learn and apply to our digital investigations today. We will then take a look at how we can leverage modern forensic software to make the process of working with privileged data more efficient and more reliable.Key Learnings:Learn some key legal considerations when inves...

CYBERWOX

YouTube video

Detection: Challenging Paradigms

Detection: Challenging ParadigmsDec 04, 2023Share00:0054:12Episode 36: Chris ThompsonChris Thompson (@_Mayyhem on X) joins Jared and Luke on this episode of DCP! Chris has led the charge on offensive research into System Center Configuration Manager (SCCM), and shares his insight into this often overlooked aspect of the threat landscape! Resources: #sccm on the BloodHoundGang slack workspace: //bloodhoundgang.herokuapp.com/ //medium.com/@MayyhemDec 04, 202354:12Episode 35: Luke JenningsDCP is ba...

Digital Forensic Survival Podcast

Eclypsium

Hacker Valley Blue

YouTube video

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

Huntress

YouTube video

YouTube video

YouTube video

InfoSec_Bret

YouTube video

Insane Forensics

YouTube video

Intel471

Dec 06, 2023 Bluma Janowitz is a social engineer and red team agent. She specializes in what are called red-teaming exercises, which are designed to test an organization’s defenses against malicious hackers. She might try to trick employees into giving up sensitive information over the phone or drop USB drives in places where curious people might put them in their computers. She talks her way into buildings and does discreet Wi-Fi scans, taking photos along the way. These techniques are known as...

John Hammond

YouTube video

YouTube video

Magnet Forensics

YouTube video

YouTube video

YouTube video

Malwarebytes

Posted: December 4, 2023 by David Ruiz This week on the Lock and Code podcast… Like the grade-school dweeb who reminds their teacher to assign tonight’s homework, or the power-tripping homeowner who threatens every neighbor with an HOA citation, the ransomware group ALPHV can now add itself to a shameful roster of pathetic, little tattle-tales. In November, the ransomware gang ALPHV, which also goes by the name Black Cat, notified the US Securities and Exchange Commission about the Costa Mesa-ba...

MSAB

YouTube video

Nicolas Brulez at Hexorcist

YouTube video

Paraben Corporation

YouTube video

RickCenOT

YouTube video

SentinelOne

LABScon / December 6, 2023 In his keynote at LABScon23, SentinelLabs’ Principal Threat Researcher Tom Hegel addressed a crucial but often overlooked aspect of global cybersecurity: cyber threat activity in less-monitored regions, particularly Africa. Focusing on China’s strategic use of soft power across the African continent, Hegel provides a compelling analysis of how technology and investments are wielded as tools of influence and control. Highlighting its significant investments in key secto...

The CyberWire

SubscribeApple PodcastsApple PodcastsGoogle PodcastsCastboxOvercastOvercastSpotifyRSSShow NotesDana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TA...