解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 52 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

AhmedS Kasmani

YouTube video

YouTube video

Anuj Soni

YouTube video

ArcPoint Forensics

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Talkin’ About Infosec News – 12/15/2023 Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

Breaking Badness

BSides Cape Town

YouTube video

YouTube video

YouTube video

Cellebrite

YouTube video

YouTube video

Cloud Security Podcast by Google

Guest: Kevin Mandia, CEO at Mandiant, part of Google Cloud 29:29 Subscribe at Google Podcasts.Subscribe at Spotify.Subscribe at Apple Podcasts.Subscribe at YouTube Topics covered: When you look back, what were the most surprising cloud breaches in 2023, and what can we learn from them? How were they different from the “old world” of on-prem breaches? For a long time it’s felt like incident response has been an on-prem specialization, and that adversaries are primarily focused on compromising on-...

CYBERWOX

YouTube video

Detection: Challenging Paradigms

Detection: Challenging ParadigmsDec 22, 2023Share00:0001:12:11Episode 37: Steve Luke and Roman DaszczyszakThe Summiting the Pyramid project by MITRE's Center for Threat Informed Defense (CTID) released in September 2023, allowing for a unified method of "grading" detections for efficacy. Two of the pivotal members of that project join Jared and Luke to talk about how it came to be, and how it can be used to further the detection program of any organization! Project Links: Initial Release Blog Po...

Digital Forensic Survival Podcast

Hacker Valley Blue

YouTube video

InfoSec_Bret

YouTube video

Magnet Forensics

iOS and Android devices are usually a plethora of media data, but what types of media data await an examiner? What is the difference between a HEIC and a JPEG, a PNG and a KTX, ProRes and ProRaw, or even a Live Photo versus a Motion Photo? Which types of media are going to be natively viewable, and which ones will require a special viewer? Join Chris Vance in this next episode of Mobile Unpacked, where he will explore the different types of media files that are present on both Android and iOS de...

MSAB

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

NVISO Belgium

YouTube video

OS Security as a Science: Anticipatory Improvements Under Countermeasures

In recent years, Windows OS has faced a surge in attacks exploiting kernel drivers, notably targeting AV and EDR systems. The vulnerable Asynchronous Local Procedure Call (ALPC) technology, vital for client-server interactions, lacks essential safeguards, as demonstrated in successful attacks at LABScon 2022 and Ekoparty 2022. To address ALPC vulnerabilities, we propose ALPChecker, a proactive security tool detecting kernel mode attacks by checking client and server ALPC ports. It plays a critic...

Richard Davis at 13Cubed

YouTube video

SANS

YouTube video

SANS Cloud Security

YouTube video

WeLiveSecurity

ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces ESET Research 18 Dec 2023 • , 1 min. read In this episode of our podcast, ESET malware researchers talk about the dynamics within and between various Neanderthal groups, the techniques that this horde of scammers uses to find and select the best Mammoths for hunting, and especially about Neanderthals teaching each other how to wield Tel...