本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
ArcPoint Forensics
YouTube video
YouTube video
YouTube video
YouTube video
Black Hat
YouTube video
Black Hills Information Security
Better Together: Real Time Threat Detection for Kubernetes with Atomic Red Tests & Falco Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site
YouTube video
Breaking Badness
Hazel Burton at Cisco’s Talos
By Hazel Burton Monday, January 8, 2024 05:30 2023YiR Year In Review In this video series, Talos’ Director of Threat Intelligence and Interdiction Matt Olney and Head of Outreach Nick Biasini share their insights on the most significant cybersecurity threats from the past year. From attacks on network infrastructure to the latest APT activities, as well as an update on our Ukraine Task Force, these short videos provide some great insights into the current cybersecurity threat environment.You can...
Cybereason
Written By Malicious Life Podcast In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom into the realm of cybersecurity, the number dwindles even further to a startling 20 to 24 percent. What are the underlying reasons behind this disparity? Powered by RedCircle Share About the Author Malicious Life Podcast The Malicious Life Podcast by Cybereason examines the human and technical factors behind the scenes that make cybercrime what it is today. Malicious L...
Written By Malicious Life Podcast In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handed President Raegan a top secret collection of documents, called Farewell Dossier. The information found in the dossier allowed the US to devise a cunning plan - the very first supply chain attack, if you will - to bring a firey end to one of largest industrial espionage campaigns in history. Powered by RedCircle Share About the Author Malicious Life Podcast The Malicious Life Podca...
Digital Forensic Survival Podcast
Dump-Guy Trickster
YouTube video
Gerald Auger at Simply Cyber
YouTube video
Huntress
YouTube video
YouTube video
Insane Forensics
YouTube video
Intel471
Jan 09, 2024 In the early 2010s, a group of malicious hackers had a goal: to build a Durango, which was the code name for Microsoft’s next-generation gaming console, eventually known as the Xbox One. They did this by stealing reams of data: authentication keys, personal data, login credentials, and proprietary gaming documents. Arman Sadri was on the fringes of the group. He was a gaming hacker who taught himself programming languages such as C# and C++ and how to hack games like Call of Duty. H...
Jai Minton
YouTube video
Magnet Forensics
The use of Mac computers for business applications continues to grow steadily, now up to 23% of computers according to IDC*. However, recent security updates from Apple have introduced challenges in data collection from Mac endpoints. Join us for an exciting webinar, co-presented with Jamf, where we’ll address the unique needs of digital forensic examiners who need to investigate Mac endpoints. Dean Carlson, Senior Product Manager at Magnet Forensics, and Alec Quinn, Systems Engineer – Developer...
MSAB
YouTube video
SANS Cyber Defense
YouTube video