本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Richard T. Frawley at ADF Solutions
Posted by Richard T. Frawley on December 12, 2023 Find me on: LinkedIn Twitter Tweet In the fast-paced world of digital forensics, investigators rely on cutting-edge tools to efficiently and effectively analyze digital evidence. ADF Solutions, a renowned player in the field, has recently released an insightful video walkthrough, providing a detailed overview of their evaluation process for their forensic software. Hardware Requirements 1 License Dongle (DEI - TG2 - TINV) USB device has a storage...
Adversary Universe Podcast
Download831Organizations around the world must navigate a growing number of cyber incident reporting regulations mandated by government bodies. In the U.S., these regulations come from agencies including the Securities and Exchange Commission (SEC), Federal Trade Commission (FTC), Cybersecurity and Infrastructure Security Agency (CISA) and others. This “alphabet soup” of regulations, as Cristian puts it, can be tough for businesses to understand and follow — especially as the threat landscape ev...
Alexis Brignoni
YouTube video
ArcPoint Forensics
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
Black Hills Information Security
| Steve Borosh Introduction I previously blogged about spoofing Microsoft 365 using the direct send feature enabled by default when creating a business 365 Exchange Online instance (//www.blackhillsinfosec.com/spoofing-microsoft-365-like-its-1995/). Using the direct send feature, it may be possible to send emails from outside or inside of the organization to other users in the tenant “by design.” A “smart host” is created with the default Exchange Online instance at “company.mail.protection.outl...
Brought to you by Antisyphon Training — //www.antisyphontraining.com Spamming Microsoft 365 Like It’s 1995 Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site
BlueMonkey 4n6
YouTube video
BSides Cape Town
YouTube video
Cellebrite
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
Hazel Burton at Cisco’s Talos
By Hazel Burton Monday, December 11, 2023 05:48 2023YiR Year In Review In this video, experts from across Cisco Talos came together to discuss the 2023 Talos Year in Review. We chat about what’s new, what’s stayed the same, and how the geopolitical environment has affected the threat landscape. This video was recorded live on social media: Read the 2023 Cisco Talos Year in Review Download Now We also discussed Project PowerUp, the story of how Cisco helped to keep the lights on in Ukraine. Read ...
Cyber Secrets
YouTube video
Digital Forensic Survival Podcast
Forensic Focus
UK Cyber 9/12 Strategy Challenge And CyberWomen Groups C.I.C.
Picture Perfect: Using Screenshots And Screen Recording In Mobile Device Investigations
Acquisition And Extraction With Cellebrite’s New Endpoint Mobile Now And Mobile Ultra
Huntress
YouTube video
YouTube video
InfoSec_Bret
YouTube video
Insane Forensics
YouTube video
John Hammond
YouTube video
Magnet Forensics
- Top Cyber Threats to Financial Services & How to Rapidly Investigate with Digital Forensic Solutions
Financial institutions are one of the most targeted industries for cyber attacks, resulting in some of the strictest cyber incident reporting regulations. In this webinar, we’ll discuss the top cyber threats faced by financial services, such as ransomware and business email compromise, and how modern digital forensic solutions can help DFIR teams uncover the root cause of incidents quickly to meet regulatory requirements. After viewing this webinar, you can download a certificate of completion f...
In the realm of legal discovery, there is a duty to preserve data potentially relevant to litigation—something all too familiar to digital forensic practitioners who use forensic collection tools and techniques to preserve that data to ensure its later available when discovery obligations emerge. After viewing this webinar, you can download a certificate of completion from the event console. Trey Amick Director, Forensic Consultants Trey Amick Director, Forensic Consultants Nick Torrecillas Dire...
Magnet REVIEW helps you empower your investigators and other stakeholders to easily and securely collaborate on digital evidence review from any of your sources, and from anywhere in the world. Our latest version of REVIEW makes it even easier for you to bring your investigators and their evidence together, with a revamped user interface to help them to quickly find the evidence that matters and a new SaaS-based option designed to simplify deployment and management. Join Magnet Forensics’ Nicole...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsGoogle PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Judy Ng, Mark Parsons, and Ned Moran. Together, they delve into the riveting world of Cyberwarcon, exploring the activities of threat actors such as Volt Typhoon from China and Iranian-based adversaries. Sherrod sheds light on Volt Typhoon's strategic targeting of critical infrastructure wh...
MSAB
YouTube video
Nuix
YouTube video
OALabs
YouTube video
The Defender’s Advantage Podcast
Carlos Perez at TrustedSec
Skip to Main Content Menu Search Input Search Contact Us Report a breach Blog Tech Brief - Citrix Bleed Abused by Ransomware Crews December 12, 2023 Tech Brief - Citrix Bleed Abused by Ransomware Crews Written by Carlos Perez Vulnerability Assessment Research Welcome to our first brief on current events in the industry that TrustedSec believes our customers should know.PlayCitrix Bleed Abused by Ransomware CrewsCitrix vulnerability CVE 2023-4966 impacts Citrix NetScaler web application delivery ...
Uptycs
Uptycs named to Deloitte Fast 500 Why Uptycs? Products Show submenu for Products Cloud Security Overview - Why CNAPP Workload Protection (CWPP) Posture Management (CSPM) Entitlement Management (CIEM) Threat Detection and Response (CDR) Container and K8s Security (KSPM) Endpoint Security Overview - Why XDR Workspace and Workload Security IBM Power, Linux on Z, LinuxONE, and AIX Uptycs XDR vs. The Old Way Solutions Show submenu for Solutions Solutions Compliance Vulnerability Management Detection ...