解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 02 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

ArcPoint Forensics

YouTube video

YouTube video

YouTube video

YouTube video

Black Hat

YouTube video

Black Hills Information Security

Better Together: Real Time Threat Detection for Kubernetes with Atomic Red Tests & Falco Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

YouTube video

Breaking Badness

Hazel Burton at Cisco’s Talos

By Hazel Burton Monday, January 8, 2024 05:30 2023YiR Year In Review In this video series, Talos’ Director of Threat Intelligence and Interdiction Matt Olney and Head of Outreach Nick Biasini share their insights on the most significant cybersecurity threats from the past year. From attacks on network infrastructure to the latest APT activities, as well as an update on our Ukraine Task Force, these short videos provide some great insights into the current cybersecurity threat environment.You can...

Cybereason

Written By Malicious Life Podcast In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom into the realm of cybersecurity, the number dwindles even further to a startling 20 to 24 percent. What are the underlying reasons behind this disparity? Powered by RedCircle Share About the Author Malicious Life Podcast The Malicious Life Podcast by Cybereason examines the human and technical factors behind the scenes that make cybercrime what it is today. Malicious L...

Written By Malicious Life Podcast In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handed President Raegan a top secret collection of documents, called Farewell Dossier. The information found in the dossier allowed the US to devise a cunning plan - the very first supply chain attack, if you will - to bring a firey end to one of largest industrial espionage campaigns in history. Powered by RedCircle Share About the Author Malicious Life Podcast The Malicious Life Podca...

Digital Forensic Survival Podcast

Dump-Guy Trickster

YouTube video

Gerald Auger at Simply Cyber

YouTube video

Huntress

YouTube video

YouTube video

Insane Forensics

YouTube video

Intel471

Jan 09, 2024 In the early 2010s, a group of malicious hackers had a goal: to build a Durango, which was the code name for Microsoft’s next-generation gaming console, eventually known as the Xbox One. They did this by stealing reams of data: authentication keys, personal data, login credentials, and proprietary gaming documents. Arman Sadri was on the fringes of the group. He was a gaming hacker who taught himself programming languages such as C# and C++ and how to hack games like Call of Duty. H...

Jai Minton

YouTube video

Magnet Forensics

The use of Mac computers for business applications continues to grow steadily, now up to 23% of computers according to IDC*. However, recent security updates from Apple have introduced challenges in data collection from Mac endpoints. Join us for an exciting webinar, co-presented with Jamf, where we’ll address the unique needs of digital forensic examiners who need to investigate Mac endpoints. Dean Carlson, Senior Product Manager at Magnet Forensics, and Alec Quinn, Systems Engineer – Developer...

MSAB

YouTube video

SANS Cyber Defense

YouTube video