解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 51 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Richard T. Frawley at ADF Solutions

Posted by Richard T. Frawley on December 12, 2023 Find me on: LinkedIn Twitter Tweet In the fast-paced world of digital forensics, investigators rely on cutting-edge tools to efficiently and effectively analyze digital evidence. ADF Solutions, a renowned player in the field, has recently released an insightful video walkthrough, providing a detailed overview of their evaluation process for their forensic software. Hardware Requirements 1 License Dongle (DEI - TG2 - TINV) USB device has a storage...

Adversary Universe Podcast

Download831Organizations around the world must navigate a growing number of cyber incident reporting regulations mandated by government bodies. In the U.S., these regulations come from agencies including the Securities and Exchange Commission (SEC), Federal Trade Commission (FTC), Cybersecurity and Infrastructure Security Agency (CISA) and others. This “alphabet soup” of regulations, as Cristian puts it, can be tough for businesses to understand and follow — especially as the threat landscape ev...

Alexis Brignoni

YouTube video

ArcPoint Forensics

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Black Hills Information Security

| Steve Borosh Introduction I previously blogged about spoofing Microsoft 365 using the direct send feature enabled by default when creating a business 365 Exchange Online instance (//www.blackhillsinfosec.com/spoofing-microsoft-365-like-its-1995/). Using the direct send feature, it may be possible to send emails from outside or inside of the organization to other users in the tenant “by design.” A “smart host” is created with the default Exchange Online instance at “company.mail.protection.outl...

Brought to you by Antisyphon Training — //www.antisyphontraining.com Spamming Microsoft 365 Like It’s 1995 Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

BlueMonkey 4n6

YouTube video

BSides Cape Town

YouTube video

Cellebrite

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Hazel Burton at Cisco’s Talos

By Hazel Burton Monday, December 11, 2023 05:48 2023YiR Year In Review In this video, experts from across Cisco Talos came together to discuss the 2023 Talos Year in Review. We chat about what’s new, what’s stayed the same, and how the geopolitical environment has affected the threat landscape. This video was recorded live on social media: Read the 2023 Cisco Talos Year in Review Download Now We also discussed Project PowerUp, the story of how Cisco helped to keep the lights on in Ukraine. Read ...

Cyber Secrets

YouTube video

Digital Forensic Survival Podcast

Forensic Focus

Huntress

YouTube video

YouTube video

InfoSec_Bret

YouTube video

Insane Forensics

YouTube video

John Hammond

YouTube video

Magnet Forensics

Financial institutions are one of the most targeted industries for cyber attacks, resulting in some of the strictest cyber incident reporting regulations. In this webinar, we’ll discuss the top cyber threats faced by financial services, such as ransomware and business email compromise, and how modern digital forensic solutions can help DFIR teams uncover the root cause of incidents quickly to meet regulatory requirements. After viewing this webinar, you can download a certificate of completion f...

In the realm of legal discovery, there is a duty to preserve data potentially relevant to litigation—something all too familiar to digital forensic practitioners who use forensic collection tools and techniques to preserve that data to ensure its later available when discovery obligations emerge. After viewing this webinar, you can download a certificate of completion from the event console. Trey Amick Director, Forensic Consultants Trey Amick Director, Forensic Consultants Nick Torrecillas Dire...

Magnet REVIEW helps you empower your investigators and other stakeholders to easily and securely collaborate on digital evidence review from any of your sources, and from anywhere in the world. Our latest version of REVIEW makes it even easier for you to bring your investigators and their evidence together, with a revamped user interface to help them to quickly find the evidence that matters and a new SaaS-based option designed to simplify deployment and management. Join Magnet Forensics’ Nicole...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Judy Ng, Mark Parsons, and Ned Moran. Together, they delve into the riveting world of Cyberwarcon, exploring the activities of threat actors such as Volt Typhoon from China and Iranian-based adversaries. Sherrod sheds light on Volt Typhoon's strategic targeting of critical infrastructure wh...

MSAB

YouTube video

Nuix

YouTube video

OALabs

YouTube video

The Defender’s Advantage Podcast

Carlos Perez at TrustedSec

Skip to Main Content Menu Search Input Search Contact Us Report a breach Blog Tech Brief - Citrix Bleed Abused by Ransomware Crews December 12, 2023 Tech Brief - Citrix Bleed Abused by Ransomware Crews Written by Carlos Perez Vulnerability Assessment Research Welcome to our first brief on current events in the industry that TrustedSec believes our customers should know.PlayCitrix Bleed Abused by Ransomware CrewsCitrix vulnerability CVE 2023-4966 impacts Citrix NetScaler web application delivery ...

Uptycs

Uptycs named to Deloitte Fast 500 Why Uptycs? Products Show submenu for Products Cloud Security Overview - Why CNAPP Workload Protection (CWPP) Posture Management (CSPM) Entitlement Management (CIEM) Threat Detection and Response (CDR) Container and K8s Security (KSPM) Endpoint Security Overview - Why XDR Workspace and Workload Security IBM Power, Linux on Z, LinuxONE, and AIX Uptycs XDR vs. The Old Way Solutions Show submenu for Solutions Solutions Compliance Vulnerability Management Detection ...