解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 06 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Black Hat

YouTube video

YouTube video

YouTube video

YouTube video

BlueMonkey 4n6

YouTube video

Breaking Badness

CYBERWOX

YouTube video

Digital Forensic Survival Podcast

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

Season 2, Ep. 6•Sunday, February 4, 2024We're catching up with Jo to learn more about her journey into cyber and all the things in between including a PhD, lunch with the (now) King Charles III, memes and lots of digressions.Show moreRSSMore episodesView all episodes7. Hardly a Week 5 February 5, 2024 07:23Season 2 is out now! Welcome to Hardly a Week 5 2024! Come along and listen to the new things in cyber, and Desi chat about what it takes to get into cybersecurity in 2024 each week.Want to wi...

Insane Forensics

YouTube video

Intel471

Feb 06, 2024 Over many years, a cybercriminal gang likely based in Russia built a huge network of interconnected, hacked computers. They did this one inbox at a time. They sent spam messages with fake documents and malicious links, tricking people into opening malicious software. The network of hacked computers was called Qakbot, or QBot. The botnet was used by cybercriminal gangs to infiltrate computers, steal their data, conduct financial crime and deploy ransomware. But in 2023, law enforceme...

Jai Minton

YouTube video

John Hammond

YouTube video

YouTube video

YouTube video

Lee Whitfield at MacAdemia

YouTube video

YouTube video

YouTube video

Magnet Forensics

Most cloud investigations focus around host or endpoint data but there is a wealth of additional information available to an investigation if responders know where to look. The first logical place is CloudTrail logs but if an organization uses AWS Config, it contains a wealth of information that can compliment an investigation that is often overlooked. In this talk, we’ll show how you can pull data from AWS Config and use it in your next incident. After viewing this webinar, you can download a c...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Christine Fossaceca, Laurie Kirk, and Apurva Kumar. Today's discussion concerns a recent release from the Chaos Computer Congress, where researchers discovered and analyzed a zero-click attack on iPhones. The attack involves four zero-day vulnerabilities in iOS, requiring a malicious iMessage, a hardware bug, and a...

MSAB

YouTube video

Paraben Corporation

YouTube video